PURPLELEC BLOG
Let Technology And Passion Collide To Generate More Inspiration. For questions about the blog, please contact the administrators or leave a message.
By PURPLELEC | 23 October 2024 | 0 Comments

Understanding the Thunderspy Exploit: How to Protect Your Thunderbolt™ Port

  Even if your computer is locked or your data is encrypted, hackers can still access your information through the security vulnerability of the Thunderbolt port. Therefore, we need to clarify the newly discovered vulnerability, explain how to protect yourself, and remind you to be extra careful when using Thunderbolt ports to connect peripherals.
  Thunderspy Vulnerability Overview
  The Thunderbolt port provides extremely fast transfer speeds by connecting directly to the PC memory. It was developed by Intel and Apple and uses PCI Express, USB-C, and DisplayPort communication channels to achieve lightning-fast data transfer from the PC to peripherals. However, this architectural model also makes devices vulnerable to Thunderspy attacks.
  Thunderspy is a newly discovered direct memory access (DMA) attack variant that can be attacked by any expansion port that has access to the system memory. Hackers use these access rights to steal data, track files, or run malicious code on the system. Although implementing Thunderbolt attacks requires more complex techniques than the Thunderclap vulnerability, most devices have already received security patches for Thunderclap.
Thunderspy Vulnerability
  Thunderclap vulnerability review
  The Thunderclap vulnerability was discovered in 2016 and allowed hackers to take control of PCs by physically accessing unattended devices. By plugging in a USB-C device pre-installed with malicious code, hackers could exploit the operating system and hardware design to gain access to Thunderbolt-enabled PCs. More worryingly, the malicious code could be hidden in real peripherals, leaving users who purchased infected devices unaware. The connected device could function normally while capturing information and transmitting it to malicious actors.
  To address these issues, users receive warnings from device manufacturers whenever the Thunderbolt port communicates with PC memory, and new patches have improved security protocols. Microsoft, Apple, and Linux have also rolled out software patches that improve the security of older generations of Thunderbolt ports.
  From Thunderclap to Thunderspy
  Since PCs can also be attacked in sleep mode and the Thunderclap vulnerability takes only minutes to deploy and bypass the lock screen, security patches were quickly rolled out. However, researchers continue to conduct penetration tests on devices using Thunderbolt technology, and the Thunderspy vulnerability created by Ruytenberg is one of the first successful ones.
  Thunderspy requires a malicious attacker to unscrew the back panel of a computer. Ruytenberg showed that with just a few minutes of unattended PC access, it is possible for a hacker to reprogram the Thunderbolt firmware without leaving any trace that the device was compromised. This attack is called an "evil maid attack" because it can put specific systems at risk and pose a significant threat to individual targets. According to the Thunderspy attack video shot by Ruytenberg, it took just over two minutes to deploy the vulnerability.
  In summary, it is critical to understand and protect against security vulnerabilities in Thunderbolt ports. By being vigilant and taking appropriate security measures, you can reduce the risk of such attacks.

Leave a Reply

Your email address will not be published.Required fields are marked. *
Name
E-mail
Content
Verification code
ver_code