{"id":29216,"date":"2026-02-26T10:08:39","date_gmt":"2026-02-26T09:08:39","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=29216"},"modified":"2026-02-26T10:08:41","modified_gmt":"2026-02-26T09:08:41","slug":"bitlocker-overview-understanding-todays-threats","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/","title":{"rendered":"BitLocker Overview: Understanding Today\u2019s Threats"},"content":{"rendered":"\n<p style=\"text-align: justify;\">Nowadays, security efforts primarily focus on web applications, internal infrastructures, Active Directory, and other traditional attack surfaces. Yet with the rise of remote work, employees\u2019 <strong>workstations<\/strong> are increasingly <strong>exposed to theft<\/strong>.<\/p>\n<p style=\"text-align: justify;\">In this context, the main security measure available to secure data at rest is full-disk encryption. For this, most companies rely on the built-in Microsoft disk encryption tool <strong>BitLocker<\/strong>. However, simply enabling disk encryption is often assumed to be <strong>sufficient to protect data at rest<\/strong>.<\/p>\n<p style=\"text-align: justify;\">While BitLocker is presented as the solution to data confidentiality and integrity, it can still <strong>be bypassed<\/strong>, with either inexpensive hardware or software-based attacks. Such attacks lead to the <strong>total loss of confidentiality and integrity<\/strong> on the target machine.<\/p>\n<p style=\"text-align: justify;\">In this article, we summarize how BitLocker works and build up on this knowledge to examine recent <strong>physical<\/strong> and <strong>logical<\/strong> attacks that continue to threaten workstations security.<\/p>\n<p>\u00a0<\/p>\n<h2>Reminders about how BitLocker works<\/h2>\n<p style=\"text-align: justify;\">BitLocker is a full-disk encryption mechanism built into Windows since its introduction with Windows Vista in January 2007, defined as follows: \u201cBitLocker is a <strong>Windows security feature<\/strong> that provides encryption for entire volumes, addressing the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices.\u201d (<span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/operating-system-security\/data-protection\/bitlocker\/\">BitLocker Overview | Microsoft Learn<\/a><\/span>)<\/p>\n<p style=\"text-align: justify;\">Its security relies on a simple key hierarchy: the leakage of one key can compromise the whole disk.<\/p>\n<p style=\"text-align: justify;\">Two keys are involved:<\/p>\n<ol style=\"text-align: justify;\">\n<li>the Full Volume Encryption Key (<strong>FVEK<\/strong>), which encrypts disk sectors<\/li>\n<li>the Volume Master Key (<strong>VMK<\/strong>), which encrypts the FVEK. This key is stored and protected by the Trusted Platform Module (<strong>TPM<\/strong>), a security component designed to store cryptographic secrets.<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">The FVEK is stored on disk encrypted by the VMK; during boot time, the decryption happens as such:<\/p>\n<figure id=\"attachment_29219\" aria-describedby=\"caption-attachment-29219\" style=\"width: 725px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-29219\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/1-BitLocker-Disk-Decryption-Process.png\" alt=\"BitLocker Disk Decryption Process\" width=\"725\" height=\"253\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/1-BitLocker-Disk-Decryption-Process.png 1476w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/1-BitLocker-Disk-Decryption-Process-437x152.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/1-BitLocker-Disk-Decryption-Process-71x25.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/1-BitLocker-Disk-Decryption-Process-768x268.png 768w\" sizes=\"auto, (max-width: 725px) 100vw, 725px\" \/><figcaption id=\"caption-attachment-29219\" class=\"wp-caption-text\"><em>BitLocker Disk Decryption Process<\/em><\/figcaption><\/figure>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">Workstation used as example in this article <strong>delivers VMK through SPI bus<\/strong>, but various other protocols such as <strong>LPC<\/strong> could be observed (LPC does not imply more security features than SPI).<\/p>\n<p style=\"text-align: justify;\">The VMK is released during boot over an <strong>SPI bus <\/strong>(low-speed serial protocol with 4 signals\u2019 lines)<strong> between the TPM chip and the CPU<\/strong>. This key is the most critical component, as it allows decryption of the entire disk.<\/p>\n<p style=\"text-align: justify;\">This architecture shows that at a specific moment, the VMK is transmitted in clear text in the SPI bus and the FEVK key is stored un-encrypted in RAM. This configuration can be <strong>leveraged by attackers<\/strong> <strong>with various physical and logical attacks<\/strong>. The following sections describe how this behavior can be exploited.<\/p>\n<p>\u00a0<\/p>\n<h2>Physical attacks<\/h2>\n<p style=\"text-align: justify;\">Physical attacks require <strong>dedicated physical equipment to exploit vulnerability<\/strong>. This typically involves using tools such as probes, logical analyzers and dedicated malicious peripherals.<\/p>\n<p style=\"text-align: justify;\">Against BitLocker and TPM, hardware attacks can still, with few prerequisites, be <strong>exploited today<\/strong>. This section focuses on the two main hardware-based techniques: <strong>TPM sniffing<\/strong> and <strong>DMA attacks.<\/strong><\/p>\n<p>\u00a0<\/p>\n<h3>TPM sniffing<\/h3>\n<p style=\"text-align: justify;\">At rest, the VMK is stored and protected by the TPM. It is released on boot and transmitted to the CPU. TPM assumes that the communication channel is secure and cannot be compromised. However, on the motherboard, this communication channel is usually defined by a SPI bus linking different chips together.<\/p>\n<p style=\"text-align: justify;\">Attack prerequisites:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>140\u20ac of probes and logic analyzers hardware<\/strong>.<\/li>\n<li>Physical access to a powered-off system.<\/li>\n<li>BitLocker configured <strong>without pre-boot PIN code<\/strong>.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">The main idea behind this attack is to locate the bus where the VMK is transmitted, put probes to capture the data exchanged on the bus and extract the VMK when booting.<\/p>\n<p style=\"text-align: justify;\">Therefore, the first step is identifying the TPM chip and its SPI interface. Thankfully, TPMs are standardized components with <strong>known pinouts<\/strong>. By examining the motherboard layout, datasheets, or publicly available information, the attacker can determine which pins correspond to TPM SPI signals.<\/p>\n<p style=\"text-align: justify;\">Once the bus is identified, the attacker establishes a stable physical connection to the bus by attaching probes on the motherboard. In the current example probes used are <strong>Sensepeek SP10<\/strong>, for their precision. In practice, the SPI bus is often <strong>shared with other components<\/strong> that <strong>passively receive the traffic without processing it<\/strong>, such as the <strong>BIOS flash<\/strong> chip. Sniffing the bus from these components is frequently easier, and this is the approach used in our example below:<\/p>\n<figure id=\"attachment_29221\" aria-describedby=\"caption-attachment-29221\" style=\"width: 579px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-29221\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/2-Probes-Sniffing-SPI-Protocol-on-BIOS-chip.png\" alt=\"Probes Sniffing SPI Protocol on BIOS chip\" width=\"579\" height=\"389\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/2-Probes-Sniffing-SPI-Protocol-on-BIOS-chip.png 1054w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/2-Probes-Sniffing-SPI-Protocol-on-BIOS-chip-284x191.png 284w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/2-Probes-Sniffing-SPI-Protocol-on-BIOS-chip-58x39.png 58w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/2-Probes-Sniffing-SPI-Protocol-on-BIOS-chip-768x516.png 768w\" sizes=\"auto, (max-width: 579px) 100vw, 579px\" \/><figcaption id=\"caption-attachment-29221\" class=\"wp-caption-text\"><em>Probes Sniffing SPI Protocol on BIOS chip<\/em><\/figcaption><\/figure>\n<p style=\"text-align: justify;\">A <strong>logic analyzer<\/strong> is then connected to the probes in passive listening mode. This device permit to <strong>capture<\/strong> and <strong>decode digital signals<\/strong>. It allows signal analysis and translation in known protocol, such as SPI. In the current example, logical analyzer <strong>sipeed slogic16u3<\/strong> is used. The only requirement is to use a logic analyzer with a sufficient capture rate. This allows signals to be captured at <strong>200MHz<\/strong>, which is sufficient. Importantly, the attacker does not need to inject traffic or interfere with the bus; <strong>simply observing is sufficient<\/strong>.<\/p>\n<p style=\"text-align: justify;\">Open-source projects such as <strong>PulseView<\/strong> can be used to interpret captured data. Publicly available plugins can then be used to decode electronic signals back into the communication protocols:<\/p>\n<figure id=\"attachment_29223\" aria-describedby=\"caption-attachment-29223\" style=\"width: 1355px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-29223\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/3-PulseView-Interpreting-Signal-and-Detecting-VMK-BitLocker-Key.png\" alt=\"PulseView Interpreting Signal and Detecting VMK BitLocker Key\" width=\"1355\" height=\"887\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/3-PulseView-Interpreting-Signal-and-Detecting-VMK-BitLocker-Key.png 1355w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/3-PulseView-Interpreting-Signal-and-Detecting-VMK-BitLocker-Key-292x191.png 292w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/3-PulseView-Interpreting-Signal-and-Detecting-VMK-BitLocker-Key-60x39.png 60w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/3-PulseView-Interpreting-Signal-and-Detecting-VMK-BitLocker-Key-768x503.png 768w\" sizes=\"auto, (max-width: 1355px) 100vw, 1355px\" \/><figcaption id=\"caption-attachment-29223\" class=\"wp-caption-text\"><em>PulseView Interpreting Signal and Detecting VMK BitLocker Key<\/em><\/figcaption><\/figure>\n<p style=\"text-align: justify;\"><strong>PluseView<\/strong> performs multiple steps in the same analysis. First, detected <strong>signals<\/strong> are translated into <strong>SPI protocol<\/strong>. Then, <strong>SPI protocol<\/strong> is translated into <strong>TPM commands<\/strong>, which are publicly documented. These commands have <strong>specific headers<\/strong>, such as memory read or write. These functions make it possible to <strong>interpret transmitted data<\/strong> and recover, as shown in the capture, the <strong>VMK<\/strong>.<\/p>\n<p style=\"text-align: justify;\">At this point, BitLocker\u2019s root secret has been compromised without altering the system state or triggering any integrity checks.<\/p>\n<p style=\"text-align: justify;\">With the VMK recovered, the attacker can remove the disk and decrypt it offline using the open-source project <strong>Dislocker<\/strong>. This software simulates legitimate use of the VMK and find in BitLocker encrypted partition FVEK sector. Legitimate use of FVEK is then used to decrypt the entire Windows partition.<\/p>\n<figure id=\"attachment_29225\" aria-describedby=\"caption-attachment-29225\" style=\"width: 1524px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-29225\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/4-Dislocker-Enables-Read-and-Write-Access.png\" alt=\"Dislocker Enables Read and Write Access\" width=\"1524\" height=\"305\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/4-Dislocker-Enables-Read-and-Write-Access.png 1524w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/4-Dislocker-Enables-Read-and-Write-Access-437x87.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/4-Dislocker-Enables-Read-and-Write-Access-71x14.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/4-Dislocker-Enables-Read-and-Write-Access-768x154.png 768w\" sizes=\"auto, (max-width: 1524px) 100vw, 1524px\" \/><figcaption id=\"caption-attachment-29225\" class=\"wp-caption-text\"><em>Dislocker Enables Read and Write Access<\/em><\/figcaption><\/figure>\n<p style=\"text-align: justify;\">All data on disk becomes accessible, including system files, user data, and stored credentials. The impact is <strong>total loss of confidentiality and integrity<\/strong>. Unlike software-based attacks, this technique leaves no forensic trace on the system. This attack is an <strong>increasingly likely attack vector as hardware becomes more accessible, cheaper, and better documented.<\/strong><\/p>\n<p style=\"text-align: justify;\">Two major TPM versions exist, 1.2 and 2.0 (integrating cryptographic feature): this attack works on <strong>both versions<\/strong>. TPM sniffing remains possible on most workstations.<\/p>\n<p style=\"text-align: justify;\">Still, on some newer laptop models, the TPM is directly integrated into the CPU (firmware TPM). These firmware TPM make <strong>TPM sniffing impossible<\/strong>. However, these types of TPM are new and not largely deployed.<\/p>\n<p>\u00a0<\/p>\n<h3>Direct Memory Access<\/h3>\n<p style=\"text-align: justify;\"><strong>Direct Memory Access (DMA)<\/strong> is a legitimate feature that allows certain hardware components, such as network cards, graphics cards, or external devices connected via high-speed interfaces, to <strong>access a computer\u2019s memory (RAM)<\/strong> directly, without constantly involving the processor (by<span style=\"color: #000080;\"> <a style=\"color: #000080;\" href=\"https:\/\/www.synacktiv.com\/sites\/default\/files\/2023-05\/Sthack23-Cervoise-Practical_DMA_attacks.pdf\">synacktiv-slides-ng<\/a><\/span>):<\/p>\n<figure id=\"attachment_29227\" aria-describedby=\"caption-attachment-29227\" style=\"width: 1533px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-29227\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/5-Direct-Memory-Access-Principle.png\" alt=\"Direct Memory Access Principle\" width=\"1533\" height=\"590\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/5-Direct-Memory-Access-Principle.png 1533w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/5-Direct-Memory-Access-Principle-437x168.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/5-Direct-Memory-Access-Principle-71x27.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/5-Direct-Memory-Access-Principle-768x296.png 768w\" sizes=\"auto, (max-width: 1533px) 100vw, 1533px\" \/><figcaption id=\"caption-attachment-29227\" class=\"wp-caption-text\"><em>Direct Memory Access Principle<\/em><\/figcaption><\/figure>\n<p style=\"text-align: justify;\">BitLocker assumes that memory accesses are controlled and trusted, with its keys stored in <strong>TPM<\/strong> or <strong>RAM<\/strong>, <strong>supposedly not accessible<\/strong> by an attacker. But this assumption can be broken. By <strong>exploiting this hardware-level trust<\/strong>, attackers with Direct Memory Access (DMA)-capable devices can <strong>read and manipulate memory<\/strong>, compromising workstation\u2019s data confidentiality and integrity. The main idea behind this attack is to <strong>connect a DMA-capable device<\/strong> to the workstation and use it to directly <strong>read physical memory<\/strong> while the system is running.<\/p>\n<p style=\"text-align: justify;\">Attack prerequisites:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Approximately <strong>160\u20ac of hardware.<\/strong><\/li>\n<li>Physical access to the workstation.<\/li>\n<li>BitLocker configured <strong>without pre-boot PIN code<\/strong>.<\/li>\n<li><strong>DMA protections disabled (IOMMU \/ Kernel DMA Protection)<\/strong> in BIOS settings.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Modern systems rely on the <strong>Input-Output Memory Management Unit<\/strong> (<strong>IOMMU<\/strong>, Intel VT-d or AMD-Vi) to <strong>enforce memory isolation <\/strong>between peripherals memories and the rest of the system. The first step is ensuring that DMA protections are disabled in the BIOS.<\/p>\n<p style=\"text-align: justify;\">BIOS passwords are often assumed to protect these settings. However, in practice they are weak control, and BIOS password removal techniques are well documented. As a result, an attacker with sufficient <strong>time and physical access<\/strong> can often <strong>disable IOMMU protections<\/strong>.<\/p>\n<p style=\"text-align: justify;\">Once DMA protections are disabled, the attacker <strong>connects a DMA-capable device<\/strong> to an <strong>exposed PCIe interface<\/strong>. In the current example, a <strong>PCI-Screamer<\/strong> device is used. This device is used as a malicious PCIe peripheral that permits to communicate in DMA and execute customized commands onto the target system.<\/p>\n<p style=\"text-align: justify;\">At this stage, the attack is orchestrated from the attacker\u2019s workstation. Open-source project related to the <strong>PCI-Screamer<\/strong>, <strong>PCILeech<\/strong>, communicates with the <strong>PCI-Screamer<\/strong> over USB-C and <strong>issue<\/strong> <strong>commands<\/strong> that instruct it to <strong>read or modify specific physical memory <\/strong>regions on the target system.<\/p>\n<p style=\"text-align: justify;\">The DMA hardware itself <strong>acts as a bridge<\/strong>: it exposes the target\u2019s memory over PCIe:<\/p>\n<figure id=\"attachment_29229\" aria-describedby=\"caption-attachment-29229\" style=\"width: 1397px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-29229\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/6-Direct-Memory-Attack-Exploitation-Setup.png\" alt=\"Direct Memory Attack Exploitation Setup\" width=\"1397\" height=\"323\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/6-Direct-Memory-Attack-Exploitation-Setup.png 1397w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/6-Direct-Memory-Attack-Exploitation-Setup-437x101.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/6-Direct-Memory-Attack-Exploitation-Setup-71x16.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/6-Direct-Memory-Attack-Exploitation-Setup-768x178.png 768w\" sizes=\"auto, (max-width: 1397px) 100vw, 1397px\" \/><figcaption id=\"caption-attachment-29229\" class=\"wp-caption-text\"><em>Direct Memory Attack Exploitation Setup<\/em><\/figcaption><\/figure>\n<p style=\"text-align: justify;\"><strong>PCILeech<\/strong> has now the capacity to load vulnerable kernel drivers to provide functionalities such as:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Executing kernel-level code on the target system<\/li>\n<li>Spawning SYSTEM shells and other executables (Windows)<\/li>\n<li>Pulling and pushing files (Linux, FreeBSD, Windows, macOS)<\/li>\n<li>Patching or removing password protections (Windows, macOS)<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">The impact goes far beyond simple data exposure. An attacker can extract the BitLocker encryption keys, <strong>access the decrypted disk offline<\/strong>, or even <strong>escalate directly to SYSTEM privileges<\/strong> on the running machine.<\/p>\n<p style=\"text-align: justify;\">Although this vulnerability does not directly target BitLocker key material in the same way as TPM sniffing attacks, it <strong>breaks the fundamental assumption that enabling disk encryption is sufficient to protect the system<\/strong>.<\/p>\n<p>\u00a0<\/p>\n<h2>Logical attacks<\/h2>\n<p style=\"text-align: justify;\">Unlike hardware attacks, these techniques rely entirely on <strong>legitimate Windows components<\/strong> and documented mechanisms. They are most often vulnerabilities subject to a patch by Microsoft. Several such attacks were disclosed in the past years.<\/p>\n<p>\u00a0<\/p>\n<h3>BitPixie<\/h3>\n<p style=\"text-align: justify;\">The target of this attack on BitLocker is the transition between the Windows boot process and the recovery environment.<\/p>\n<p style=\"text-align: justify;\">BitLocker assumes that once a boot sequence progresses into a recovery state, sensitive <strong>cryptographic material is properly cleared<\/strong> from memory. Under specific conditions, that assumption does not hold, and this behavior is leveraged by the attack commonly referred to as <strong>BitPixie<\/strong> (CVE\u20112023\u201121563).<\/p>\n<p style=\"text-align: justify;\">Attack prerequisites:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Physical access to the workstation.<\/li>\n<li>BitLocker configured <strong>without pre-boot PIN code<\/strong>.<\/li>\n<li>BIOS with <strong>Secure Boot<\/strong> <strong>enabled<\/strong> and <strong>Network access<\/strong> (PXE boot).<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">The main idea behind this attack is to force the system into a recovery state where BitLocker encryption keys remain present in memory and can be extracted. It abuses a signed but vulnerable Windows boot manager combined with a <strong>crafted Boot Configuration Data (BCD) file<\/strong> to force the system into a <strong>recovery path where BitLocker keys remain in memory<\/strong>.<\/p>\n<p style=\"text-align: justify;\">The first step is booting the target system into the <strong>Windows recovery<\/strong> environment (for example using the Shift+Restart mechanism). From there, the machine is instructed to <strong>PXE boot<\/strong>. PXE is used only as a <strong>delivery mechanism<\/strong>, the Windows installation itself is not modified.<\/p>\n<p style=\"text-align: justify;\">During the first PXE boot, the attacker provides a <strong>signed but vulnerable Windows boot manager<\/strong>. Because the binary is correctly signed, Secure Boot accepts it. This allows a downgrade to a bootloader version vulnerable to BitPixie.<\/p>\n<p style=\"text-align: justify;\">A custom BCD file is also provided. This is the critical part of the attack:<\/p>\n<ul style=\"text-align: justify;\">\n<li>The BCD defines a default boot entry pointing to <strong>a valid disk partition but an invalid boot path<\/strong>.<\/li>\n<li>The objective is to trigger a <strong>controlled boot failure<\/strong> after BitLocker has released the VMK but <strong>before the normal boot<\/strong> <strong>process completes<\/strong>.<\/li>\n<li>This causes Windows to fall back into recovery mode <strong>without clearing sensitive memory<\/strong>.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Because the bootloader and BCD are not encrypted, this entire step can be performed without authenticating to Windows.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">On the second PXE boot, the system again boots into a <strong>Secure Boot\u2013compliant environment<\/strong>. Secure Boot remains intact throughout the process. The objective is to <strong>access system memory<\/strong> while <strong>BitLocker keys remain present in RAM<\/strong>.<\/p>\n<p style=\"text-align: justify;\">From this Linux environment, the attacker exploits a kernel vulnerability (CVE\u20112024\u20111086) to gain the ability to <strong>read system memory<\/strong>. The <strong>VMK<\/strong>, <strong>still present in RAM<\/strong> due to the flawed recovery process, can then be located and extracted. No cryptographic attack is involved; the key is recovered directly from memory.<\/p>\n<p style=\"text-align: justify;\">Once the VMK is obtained, the attacker can decrypt the on-disk FVEK and <strong>mount the BitLocker-protected volume offline<\/strong>. All data on the disk becomes accessible. This attack chain can be summarized as follow:<\/p>\n<figure id=\"attachment_29231\" aria-describedby=\"caption-attachment-29231\" style=\"width: 1558px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-29231\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/7-BitPixie-Attack-Flow.png\" alt=\"BitPixie Attack Flow\" width=\"1558\" height=\"212\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/7-BitPixie-Attack-Flow.png 1558w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/7-BitPixie-Attack-Flow-437x59.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/7-BitPixie-Attack-Flow-71x10.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/7-BitPixie-Attack-Flow-768x105.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/7-BitPixie-Attack-Flow-1536x209.png 1536w\" sizes=\"auto, (max-width: 1558px) 100vw, 1558px\" \/><figcaption id=\"caption-attachment-29231\" class=\"wp-caption-text\"><em>BitPixie Attack Flow<\/em><\/figcaption><\/figure>\n<p style=\"text-align: justify;\">The core failure lies in <strong>BitLocker key lifecycle management<\/strong> rather than in the encryption itself. The recovery flow assumes that entering recovery mode is a trusted operation and fails to reliably clear sensitive memory. Secure Boot enforces code integrity, not correct key handling. <strong>Because signed but vulnerable boot components are still accepted<\/strong>, the attacker can legally reach a state where BitLocker keys remain accessible in RAM.<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">The impact of BitPixie is <strong>a full loss of confidentiality<\/strong>. A stolen, powered off, and fully patched workstation can have its disk decrypted without hardware attacks, firmware modification, or user credentials. The attack leaves no traces on the Windows installation and uses only signed components and documented boot paths. This attack was successfully demonstrated on a fully up-to-date workstation in December 2024 during the CCC talk by Thomas Lambertz: \u201cWindows BitLocker: Screwed without a Screwdriver\u201d (<a href=\"https:\/\/media.ccc.de\/v\/38c3-windows-bitlocker-screwed-without-a-screwdriver\"><span style=\"color: #000080;\">Windows BitLocker: Screwed without a Screwdriver &#8211; media.ccc.de<\/span><\/a>).<\/p>\n<p>\u00a0<\/p>\n<h3>Other attacks<\/h3>\n<p style=\"text-align: justify;\">Beyond <strong>BitPixie<\/strong>, additional software-based attacks against BitLocker were disclosed in 2025, including multiple vulnerabilities affecting the <strong>Windows Recovery Environment<\/strong> (<strong>WinRE<\/strong>). This was presented in December 2025 at the CCC talk by Alon Leview : \u201cBitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets\u201d (<span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/media.ccc.de\/v\/39c3-bitunlocker-leveraging-windows-recovery-to-extract-bitlocker-secrets\">BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets &#8211; media.ccc.de<\/a><\/span>).<\/p>\n<p style=\"text-align: justify;\">The target of these attacks is the Windows Recovery Environment. It operates as a trusted recovery operating system loaded entirely into RAM and tightly integrated with BitLocker. BitLocker assumes that recovery environments <strong>properly handle its cryptographic keys<\/strong>. Under specific conditions, these assumptions may not be held.<\/p>\n<p style=\"text-align: justify;\">Because it can inherit access to an <strong>already unlocked encrypted volume<\/strong>, weaknesses in its boot logic, RAM-disk handling, or recovery configuration files could, under specific conditions, be <strong>abused to influence execution flow or gain access to cryptographic keys<\/strong>.<\/p>\n<p style=\"text-align: justify;\">While <strong>patched<\/strong>, these findings illustrate a recurring theme: legitimate Windows mechanisms designed for resilience can inadvertently expand the attack surface.<\/p>\n<p>\u00a0<\/p>\n<h2>Additional security measures<\/h2>\n<p>In BitLocker default configuration, an attacker has options at their disposal to attack BitLocker and try to gain access to the decrypted disk. TPM sniffing, DMA exploits, and software-based attacks like BitPixie show that assuming \u201cdisk encrypted = safe\u201d is dangerously naive.<\/p>\n<p>The most effective single measure is a <strong>pre-boot BitLocker PIN<\/strong>, requiring user input before the VMK is released. This blocks most of the attacks we\u2019ve discussed. But as social engineering could be used to retrieve them from the owner, it\u2019s not a silver bullet.<\/p>\n<p>Firmware TPM protects against SPI-based TPM sniffing and DMA protections help prevent memory-based attacks. Even so, none of these controls alone is sufficient.<\/p>\n<p>True security comes from <strong>defense in depth<\/strong>. Combine pre-boot authentication, hardware protections, hardened recovery environments, and post-unlock access controls. Sensitive data should be protected by multiple layers so that compromise of a single mechanism doesn\u2019t expose the entire disk:<\/p>\n<ul>\n<li><strong>Enforce BitLocker pre-boot PIN authentication<\/strong> on all endpoints.<\/li>\n<li>Prefer <strong>firmware TPM<\/strong> when possible.<\/li>\n<li><strong>Enable DMA protections \/ IOMMU<\/strong>.<\/li>\n<li>Configure a <strong>BIOS password<\/strong>.<\/li>\n<li>Limit <strong>PXE\/network boot<\/strong>.<\/li>\n<\/ul>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Nowadays, security efforts primarily focus on web applications, internal infrastructures, Active Directory, and other traditional attack surfaces. Yet with the rise of remote work, employees\u2019 workstations are increasingly exposed to theft. In this context, the main security measure available to&#8230;<\/p>\n","protected":false},"author":1563,"featured_media":29208,"comment_status":"open","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3273,3977],"tags":[4956,4957,4958,4959,4960,4961,4962,4963,4964,4965,4966,4967,4968,4969,4971,4972,4973,4974,4975],"coauthors":[4779],"class_list":["post-29216","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking-indicent-response-en","category-focus","tag-bios","tag-bitlocker","tag-bitpixie","tag-disk-encryption","tag-dma","tag-dtpm","tag-fde","tag-ftpm","tag-fvek","tag-iommu","tag-logic-analyzer","tag-pcileech","tag-pin-bitlocker","tag-probes","tag-tpm","tag-tpm-sniffing","tag-vmk","tag-winre","tag-workstation-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BitLocker Overview: Understanding Today\u2019s Threats - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BitLocker Overview: Understanding Today\u2019s Threats - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Nowadays, security efforts primarily focus on web applications, internal infrastructures, Active Directory, and other traditional attack surfaces. Yet with the rise of remote work, employees\u2019 workstations are increasingly exposed to theft. In this context, the main security measure available to...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-26T09:08:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-26T09:08:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/cover.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1066\" \/>\n\t<meta property=\"og:image:height\" content=\"709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Louis Distel\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Louis Distel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/\"},\"author\":{\"name\":\"Louis Distel\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/97f6fb706e796fa4fbe06b8019749b88\"},\"headline\":\"BitLocker Overview: Understanding Today\u2019s Threats\",\"datePublished\":\"2026-02-26T09:08:39+00:00\",\"dateModified\":\"2026-02-26T09:08:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/\"},\"wordCount\":2512,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/cover.png\",\"keywords\":[\"BIOS\",\"Bitlocker\",\"BitPixie\",\"Disk Encryption\",\"DMA\",\"dTPM\",\"FDE\",\"fTPM\",\"FVEK\",\"IOMMU\",\"logic analyzer\",\"PCILeech\",\"PIN Bitlocker\",\"probes\",\"TPM\",\"TPM sniffing\",\"VMK\",\"WinRE\",\"Workstation security\"],\"articleSection\":[\"Ethical Hacking &amp; Incident Response\",\"Focus\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/\",\"name\":\"BitLocker Overview: Understanding Today\u2019s Threats - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/cover.png\",\"datePublished\":\"2026-02-26T09:08:39+00:00\",\"dateModified\":\"2026-02-26T09:08:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/cover.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/cover.png\",\"width\":1066,\"height\":709},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BitLocker Overview: Understanding Today\u2019s Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/97f6fb706e796fa4fbe06b8019749b88\",\"name\":\"Louis Distel\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/louis-distel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BitLocker Overview: Understanding Today\u2019s Threats - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/","og_locale":"en_US","og_type":"article","og_title":"BitLocker Overview: Understanding Today\u2019s Threats - RiskInsight","og_description":"Nowadays, security efforts primarily focus on web applications, internal infrastructures, Active Directory, and other traditional attack surfaces. Yet with the rise of remote work, employees\u2019 workstations are increasingly exposed to theft. In this context, the main security measure available to...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/","og_site_name":"RiskInsight","article_published_time":"2026-02-26T09:08:39+00:00","article_modified_time":"2026-02-26T09:08:41+00:00","og_image":[{"width":1066,"height":709,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/cover.png","type":"image\/png"}],"author":"Louis Distel","twitter_misc":{"Written by":"Louis Distel","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/"},"author":{"name":"Louis Distel","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/97f6fb706e796fa4fbe06b8019749b88"},"headline":"BitLocker Overview: Understanding Today\u2019s Threats","datePublished":"2026-02-26T09:08:39+00:00","dateModified":"2026-02-26T09:08:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/"},"wordCount":2512,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/cover.png","keywords":["BIOS","Bitlocker","BitPixie","Disk Encryption","DMA","dTPM","FDE","fTPM","FVEK","IOMMU","logic analyzer","PCILeech","PIN Bitlocker","probes","TPM","TPM sniffing","VMK","WinRE","Workstation security"],"articleSection":["Ethical Hacking &amp; Incident Response","Focus"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/","name":"BitLocker Overview: Understanding Today\u2019s Threats - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/cover.png","datePublished":"2026-02-26T09:08:39+00:00","dateModified":"2026-02-26T09:08:41+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/cover.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2026\/02\/cover.png","width":1066,"height":709},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2026\/02\/bitlocker-overview-understanding-todays-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"BitLocker Overview: Understanding Today\u2019s Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/97f6fb706e796fa4fbe06b8019749b88","name":"Louis Distel","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/louis-distel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29216","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1563"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=29216"}],"version-history":[{"count":5,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29216\/revisions"}],"predecessor-version":[{"id":29238,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/29216\/revisions\/29238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/29208"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=29216"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=29216"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=29216"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=29216"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}