Verbatim USB Drive’s Security Update: Brute Force Your Way to Data!

The Verbatim Keypad Secure USB drive, despite its AES 256-bit encryption, is vulnerable to offline brute-force attacks. With the latest update, it’s like locking your front door but leaving the windows open. The drive’s design flaw allows attackers to guess passcodes and access encrypted data, giving new meaning to “secured by design.”

Pro Dashboard

Hot Take:

When it comes to Verbatim’s Keypad Secure USB drive, it seems like the only thing “secure” is how securely it locks you out after you’ve accidentally misremembered your passcode 20 times. But don’t worry, hackers with a knack for offline brute-force attacks have you covered—they can crack it wide open faster than you can say “AES-XTS-256”!

Key Points:

  • The Verbatim Keypad Secure USB drive, despite its AES 256-bit encryption, is vulnerable to offline brute-force attacks.
  • This vulnerability is due to insecure design, even after the latest security update.
  • The attack method involves generating derived AES-XTS keys for all possible passcodes.
  • Matthias Deeg of SySS GmbH demonstrated the vulnerability with a custom brute-forcing tool.
  • There’s currently no solution for this security issue, leaving users’ encrypted data at risk.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?