{"id":774,"date":"2008-04-30T17:54:53","date_gmt":"2008-04-30T17:54:53","guid":{"rendered":"https:\/\/www.docbug.com\/blog\/archives\/774"},"modified":"2008-04-30T17:54:53","modified_gmt":"2008-04-30T17:54:53","slug":"microsoft-builds-tool-to-steal-data-off-computers","status":"publish","type":"post","link":"https:\/\/www.docbug.com\/blog\/archives\/774","title":{"rendered":"Microsoft builds tool to steal data off computers"},"content":{"rendered":"<p>From the &#8220;what could possibly go wrong&#8221; department, Microsoft just <a href=\"http:\/\/www.microsoft.com\/presspass\/features\/2008\/apr08\/04-28CrantonQA.mspx\">announced<\/a> that they&#8217;ve developed a simple one-button tool to break into a computer and suck down an entire hard drive&#8217;s contents onto a thumb drive:<\/p>\n<blockquote>\n<p>COFEE, a preconfigured, automated tool fits on a USB thumb drive. Prior to COFEE the equivalent work would require a computer forensics expert to enter 150 complex commands manually through a process that could take three to four hours. With COFEE, you simply plug into a running computer to extract the data with the click of one button &#8211;completing the work in about 20 minutes.<\/p>\n<\/blockquote>\n<p>It&#8217;s basically a whole bunch of existing password guessers and other cracking software into a single one-touch device \u2014 and since it works on the live computer it can bypass encrypted disks like Vista&#8217;s BitLocker so long as the user is still logged in.<\/p>\n<p>Apparently Microsoft isn&#8217;t concerned that they&#8217;re building tools that can turn any two-bit felon into a highly-skilled data thief, or that they&#8217;re providing products that exploit their very own security holes. After all, they&#8217;re only supplying these devices to law enforcement \u2014 so what could possibly go wrong?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From the &#8220;what could possibly go wrong&#8221; department, Microsoft just <a href=\"http:\/\/www.microsoft.com\/presspass\/features\/2008\/apr08\/04-28CrantonQA.mspx\">announced<\/a> that they&#8217;ve developed a simple one-button tool to break into a computer and suck down an entire hard drive&#8217;s contents onto a thumb drive:<\/p>\n<blockquote>\n<p>COFEE, a preconfigured, automated tool fits on a USB thumb drive. Prior to COFEE the equivalent work would require a computer forensics expert to enter 150 complex commands manually through a process that could take three to four hours. With COFEE, you simply plug into a running computer to extract the data with the click of one button &#8211;completing the work in about 20 minutes.<\/p>\n<\/blockquote>\n<p>It&#8217;s basically a whole bunch of existing password guessers and other cracking software into a single one-touch device \u2014 and since it works on the live computer it can bypass encrypted disks like Vista&#8217;s BitLocker so long as the user is still logged in.<\/p>\n<p>Apparently Microsoft isn&#8217;t concerned that they&#8217;re building tools that can turn any two-bit felon into a highly-skilled data thief, or that they&#8217;re providing products that exploit their very own security holes. After all, they&#8217;re only supplying these devices to law enforcement \u2014 so what could possibly go wrong?<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[15],"tags":[],"class_list":["post-774","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/posts\/774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/comments?post=774"}],"version-history":[{"count":0,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/posts\/774\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/media?parent=774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/categories?post=774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.docbug.com\/blog\/wp-json\/wp\/v2\/tags?post=774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}