Bjorn Ruytenberg is one of the top security researchers at Eindhoven University of Technology he has found a massive hole in the security of all devices that have come with a Thunderbolt port.
He also added that Using one simple technique “Thunderspy” attackers can easily get data from those computers within Five to Ten Minutes.
The one thing that made the thunderbolt devices a huge hit in the computer hardware community that Thunderbolt devices can easily transfer speed to its Users.
And These Ports can essentially give devices direct access to a computer’s memory, which is the one thing that makes this thunderbolt fast when compared to the Standard Universal Serial Buses (USB).
With the help of this one thing, this makes it direct access to memory Which also is going to make the computer so slow and Weak to its many potential security breaches.
Names of the Security Breaches
The first name of the security breaches was named “Thunderclap” and it can easily be avoidable.
The scientist has suggested that by simply disabling the Thunderbolt, by just allowing access to only to the DisplayPort or the USB-C devices that Plug-In.
How Easily Attackers Gain Access to Our System Even if We disable the Thunderbolt
The Researcher has also added that even if we disable the thunderbolt hackers and attackers can easily gain access to our Devices by simply having physical access to your device.
A screwdriver and some other type of portable hardware & the user would never know that an attack had ever taken place.
The Evil Maid Attack
Ruytenberg has also developed one another concept called “The evil maid attack” He preceded in one of its statements that all of these attackers who in this case is being called to as the ‘Evil Maid’ has to do these Four Thing.
- Unscrew the backplate
- Attach a device momentarily
- Reprogram the firmware
- Reattach the backplate
Doing these four things the Evil maid gets full access, in the end, he mentioned that this could be done under five Minutes.
The Entire Attack Price
The Entire Price of the attack could cost the attackers at least $400.
Intel Security System
Intel also has announced a thunderbolt security system, The kernel Direct Memory Access Protection, The Protection that it offers only for devices that were manufactured in 2019 or Later.
So the devices manufactured and sold before that remain unprotected.
List of Devices which was manufactured in 2019
There is a list of Devices of HP, Dell, and Lenovo which was manufactured in 2019 or later in which the system does not work on.
The Devices of Apple which was equipped with the thunderbolt remains unaffected unless they are running Boot Camp.
How To Protect Our Devices From These Attacks?
If you want to Protect Your Device from such type of attack one of the top scientist has Suggested Some ways.
User Should Make Sure Not To Leave their devices/systems unattended in the Public areas, While Powered On, Even if the screen is locked.