3 techniques for unlocking an SSD are encrypted
On Crucial's MX100, MX200 and 850 EVO, Samsung's T3 Portable, they hooked up to the drive's JTAG debug interface and edited the password. Type in any password to unlock the drive.
Crucial's MX300 also has a JTAG drive but is turned off by default. Instead they flash the drive with a fake firmware to authenticate using a blank password field. For the remaining drives, they reclaim the Data Encryption Key (DEK) with wear-leveling.
'Assuming DEK is stored without protection, this password is set by the user, and replaced that password with the encrypted variant'. 'Due to wear and tear, new variants are stored somewhere in storage chips, old addresses are considered unused. If not overwritten by other activities, DEK's unprotected variant can be recovered. '
Crucial and Samsung have been notified, Crucial has released patches for the firmware on the failed drive, and Samsung has updated the T3 and T5 Portable drives. With EVO drives, they encourage users to use encryption software.
See more: