Skip to main content

Archived Article — The Daily Perspective is no longer active. This article was published on 24 February 2026 and is preserved as part of the archive. Read the farewell | Browse archive

Technology

Physical Attack Bypasses BitLocker on Windows 10 and 11 PCs

A Canadian security researcher has demonstrated how a determined attacker with physical access can defeat Microsoft's full-disk encryption using off-the-shelf hardware.

Physical Attack Bypasses BitLocker on Windows 10 and 11 PCs
Image: iTnews
Key Points 3 min read
  • Canadian researcher Pierre-Nicolas Allard-Coutu demonstrated a hardware-and-software attack chain that bypasses BitLocker encryption on Windows 10 and 11 devices.
  • The attack exploits a previously undisclosed zero-day firmware vulnerability affecting multiple major vendors, with technical details withheld pending disclosure.
  • BitLocker's automatic decryption mode, enabled on most laptops for convenience, is the weakest point in the chain.
  • Adding a BIOS password and a TPM PIN are the two simplest defences users and administrators can deploy right now.
  • The threat model targets skilled, well-resourced adversaries with extended physical access, not casual thieves.

If you have ever taken comfort in knowing your laptop is encrypted, a presentation at this year's Hackfest security conference in Quebec City, Canada, may give you pause. Pierre-Nicolas Allard-Coutu, a Canadian penetration tester, walked a room of security professionals through an elaborate, multi-stage attack chain capable of defeating Microsoft's BitLocker full-disk encryption on both Windows 10 and Windows 11 machines.

The short version: if someone has enough time, skill, and physical access to your device, the encryption protecting your data may not hold. The longer version involves custom firmware tools, a PCIe slot, a programmable chip, and at least one undisclosed vulnerability sitting quietly inside the firmware of multiple major hardware vendors.

How the attack works

BitLocker relies on a chip called the Trusted Platform Module (TPM), which stores the master key used to decrypt a drive when Windows starts up. On most laptops shipped today, the TPM automatically hands over that key at boot time without asking the user for anything extra. This is a convenience feature, designed to make startup seamless, but it is precisely that convenience which creates the opening Allard-Coutu exploited.

Windows Recovery Environment command line interface
The Windows Recovery Environment, enabled by default on most laptops, provided a command-line foothold for the attack on Windows 11 machines.

To gain direct access to system memory, Allard-Coutu connected a field-programmable gate array (FPGA) card via a PCIe connector. Think of it as a reprogrammable hardware chip that can impersonate other devices to the computer. Using the open-source PCILeech framework, he then developed two custom utilities, DMAReaper and FirstStrike, to systematically work through the machine's defences.

Modern PCs have a substantial list of protections intended to stop exactly this kind of attack: kernel DMA protection, input/output memory management units (IOMMU), Secure Boot, virtualisation-based security, and firmware-level protections. Allard-Coutu worked through each of them. At one point, he copied and modified BIOS images directly.

For Windows 11 machines specifically, the attack made use of the Windows Recovery Environment (WinRE), a troubleshooting mode that ships enabled on most consumer laptops and provides command-line access. That turns out to be a meaningful foothold.

The zero-day in the room

One section of the Hackfest presentation was deliberately obscured. Allard-Coutu has identified what appears to be a zero-day vulnerability allowing an attacker to modify a specific nonvolatile RAM (NVRAM) variable, effectively disabling pre-boot DMA protection without needing a BIOS password. Crucially, triggering this vulnerability does not prompt the standard BitLocker recovery process, meaning the attack can proceed without raising any obvious alerts.

Allard-Coutu is withholding technical details because the flaw affects firmware from multiple major vendors, and responsible disclosure is still underway. The affected vendors have not been publicly named.

This is the kind of finding that keeps enterprise security teams up at night. A silent bypass of a widely trusted protection mechanism, affecting hardware across the industry, with no visible warning to the user.

What organisations and individuals should do now

The good news is that the recommended defences are straightforward, even if they are not always popular with users.

First, setting a BIOS or UEFI password raises the cost and complexity of any physical attack significantly. It will not stop the most determined adversary indefinitely, but it meaningfully extends the time and skill required.

Second, and more importantly, adding a PIN to the TPM breaks the automatic decryption chain entirely. With a TPM-plus-PIN configuration, BitLocker requires the user to enter an alphanumeric PIN before the drive will decrypt, meaning the key is never handed over automatically at boot. Allard-Coutu confirmed his current attacks cannot defeat this configuration. Other BitLocker researchers have reached the same conclusion.

The trade-off is friction. A boot PIN is one more thing users have to type before they reach their desktop, and in enterprise environments, IT departments often resist this because it increases helpdesk calls and frustrates staff. That resistance has a real cost, as Allard-Coutu's work illustrates.

Who is actually at risk?

Allard-Coutu was clear that his threat model targets sophisticated, well-funded adversaries who have extended physical access to a device. This is not the scenario where a laptop is snatched from a café table and the thief pokes around for ten minutes. The attacks demonstrated require specialised hardware, custom software, and patience.

In practice, that means the realistic targets are government agencies, corporate executives, journalists working sensitive investigations, legal professionals, and anyone else whose data is valuable enough to justify a serious, resourced effort. For most people, basic encryption with automatic TPM decryption remains a reasonable baseline against casual theft.

The real question is not whether these attacks are technically impressive, though they clearly are. It is whether organisations that hold genuinely sensitive data are treating physical security with the same seriousness they give to network defences. Too often, the answer is no. A stolen laptop encrypted with a PIN-free TPM is, as this research shows, not nearly as protected as its owner probably assumes.

The success rate of these attacks also varies by hardware generation and configuration, so not every machine is equally vulnerable. But with a zero-day affecting firmware across multiple vendors still sitting in the shadows, the full picture will not be clear until responsible disclosure runs its course.

Sources (1)
Tom Whitfield
Tom Whitfield

Tom Whitfield is an AI editorial persona created by The Daily Perspective. Covering AI, cybersecurity, startups, and digital policy with a sharp voice and dry wit that cuts through tech hype. As an AI persona, articles are generated using artificial intelligence with editorial quality controls.