Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Thunderbolt flaws affect millions of computers – even locking unattended devices won't help
ZDNet ^ | May 11, 2020 | By Liam Tung

Posted on 05/11/2020 9:07:49 AM PDT by Swordmaker

Thunderbolt vulnerabilities can let attacker with physical access steal data from memory and encrypted drives.

A Dutch researcher has detailed nine attack scenarios that work against all computers with Thunderbolt shipped since 2011 and which allow an attacker with physical access to quickly steal data from encrypted drives and memory.

Researcher Björn Ruytenberg detailed the so-called Thunderspy attacks in a report published on Sunday, warning that the attacks work even when users follow security best practice, such as locking an unattended computer, setting up Secure Boot, using strong BIOS and operating system account passwords, and enabling full disk encryption.

Microsoft to apply California's privacy law for all US users Mind-reading technology: The security and privacy threats ahead How to replace each Google service with a more privacy-friendly alternative

Microsoft was sufficiently concerned about the vulnerability of Thunderbolt 3 to Direct Memory Access (DMA) attacks that it opted against including it in its Surface devices. Some Windows 10 OEMs have adopted Thunderbolt, while all Apple Mac computers since 2011 include Thunderbolt.

(Excerpt) Read more at zdnet.com ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applepinglist; bjornruytenberg; bjrnruytenberg; computers; computing; crossplatform; dma; intel; microsoft; security; surface; thunderbolt; thunderbolt3; usb; usb3; usbc; vulnerability; windows10
Navigation: use the links below to view more comments.
first 1-2021-36 next last

1 posted on 05/11/2020 9:07:49 AM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Swordmaker

I never heard of Thunderbolt, so I guess in won’t affect me.


2 posted on 05/11/2020 9:14:07 AM PDT by JimRed (TERM LIMITS, NOW! Build the Wall Faster! TRUTH is the new HATE SPEECH.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I think they’re using the wrong kind of locks. What you want is a good lock on the door of the computer room!


3 posted on 05/11/2020 9:14:44 AM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored; ShadowAce; ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; ...
THUNDERBOLT vulnerability that cannot be fixed except in silicon affects all computers that use Thunderbolt since 2011 BUT requires physical access to your computer to exploit. Claims it can get around encryption, which I HIGHLY doubt, especially on Macs which use 256 bit AES standard and on more modern Macs does not store passwords on the computer or drive. Affects Microsoft with Thunderbolt interface as well, also may impact impending USB4 standard. —PING!


APPLE and MICROSOFT PING!

If you want on or off the Apple/Mac/iOS Ping List, Freepmail me.

4 posted on 05/11/2020 9:14:45 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I love my Powermac.


5 posted on 05/11/2020 9:19:42 AM PDT by Rurudyne (Standup Philosopher)
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user

“attacker with physical access steal data from memory and encrypted drives. “

If someone has physical access to any storage media it is vulnerable, sooner or later it gets cracked. This is why you have locked sever rooms. Thunderbolt is pretty good tech very fast and robust.


6 posted on 05/11/2020 9:21:03 AM PDT by gibsonguy
[ Post Reply | Private Reply | To 3 | View Replies]

To: Swordmaker

7 posted on 05/11/2020 9:21:45 AM PDT by grey_whiskers (The opinions are solely those of the author and are subject to change with out notice.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JimRed
I never heard of Thunderbolt, so I guess in won’t affect me.

Possibly true. If you’re a Mac user, your Mac has Thunderbolt ports. So do the Microsoft Surface computers. It’s the fastest peripheral transfer connection. However, Intel apparently made a boo-boo when they designed the original silicon back in 2011 and it’s coming back to bite the standard.

The claim this vulnerability can steal all data is bogus, I think, especially on an encrypted Mac or Mac storage drive. Macs use industry leading 256bit Advanced Encryption Standard to do such encryption which uses a single key that is not available on the device. No matter WHAT peripheral might be plugged into the Thunderbolt port by any vulnerable means cannot magically decrypt the user’s data unless the user has entered their password to decrypt the data. Such a device, no matter what they might be able to install, is also not magic and can be uninstalled, contrary to the article’s claims of locking out further updates. Apple, for example, requires a higher than Super User password to make system level changes to the core software, including firmware. Without that password, any external attempt to change things just cannot occur.

This vulnerability requires physical access to the computer. It is not a remote exploit by any means: a physical device MUST be physically plugged into the computer’s Thunderbolt port before anyone could attempt any break-in.

8 posted on 05/11/2020 9:26:14 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker
I am very surprised, and frankly very disappointed, that they didn't name this vulnerability "THUNDERSTRUCK".
9 posted on 05/11/2020 9:28:06 AM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 4 | View Replies]

To: grey_whiskers

It was fast as lightning....

oh sorry that was for the kung fu fighting thread


10 posted on 05/11/2020 9:28:07 AM PDT by xp38
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; AppyPappy; arnoldc1; ...
Thunderbolt Vulnerability ... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to Swordmaker for the ping!!

11 posted on 05/11/2020 9:30:34 AM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 4 | View Replies]

To: JimRed

A USB C connector on a laptop is likely Thunderbolt.


12 posted on 05/11/2020 9:35:21 AM PDT by ImJustAnotherOkie (All I know is The I read in the papers.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: proxy_user; Swordmaker
> I think they’re using the wrong kind of locks. What you want is a good lock on the door of the computer room!

Physical access has been "game over" security-wise since before there were computers. If someone has physical access to a computer, or a filing cabinet, there is usually a way to get the data out.

If it's encrypted, they might only get the encrypted data, but they can take it home and work on it at leisure.

Physical security has to come first -- without that, nothing else matters very much.

13 posted on 05/11/2020 9:35:48 AM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government."`)
[ Post Reply | Private Reply | To 3 | View Replies]

To: grey_whiskers

I was thinking of the ‘64 Fairlanes with the 427 and with the air intakes in place of the outer headlights. Drag racing legendary vehicles.


14 posted on 05/11/2020 9:36:25 AM PDT by John Milner (Marching for Peace is like breathing for food.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: dayglored
that they didn't name this vulnerability "THUNDERSTRUCK".

Better yet THUNDERSUCK for sucking the data out of your computer.

15 posted on 05/11/2020 9:37:24 AM PDT by ImJustAnotherOkie (All I know is The I read in the papers.)
[ Post Reply | Private Reply | To 9 | View Replies]

To: grey_whiskers

Perfect!


16 posted on 05/11/2020 9:38:08 AM PDT by Sirius Lee (They are openly stating that they intend to murder us. Prep if you want to live.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: dayglored
I am very surprised, and frankly very disappointed, that they didn't name this vulnerability "THUNDERSTRUCK".

Good one. . . Perhaps it was already taken.

17 posted on 05/11/2020 9:39:16 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplophobe bigot!)
[ Post Reply | Private Reply | To 9 | View Replies]

To: dayglored

Exactly. Physical access and enough time and you can get into any stored data.


18 posted on 05/11/2020 9:49:44 AM PDT by gibsonguy
[ Post Reply | Private Reply | To 13 | View Replies]

To: JimRed

It’s a standard that Apple was an early adopter of- but exists with, as a compliment to- USB technology- currently in USB-C (the standard for most recent smartphone chargers and data cables, and most laptops and desktops). It enables faster data transmission and multiple uses with the same cable. Think ultra HDMI plus the highest speed USB and you get close to understanding it.

But not all USB-C devices also implemented Thunderbolt technology.


19 posted on 05/11/2020 10:01:39 AM PDT by TheBattman (Democrats-Progressives-Marxists-Socialists - redundant labels.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: gibsonguy
Exactly. Physical access and enough time and you can get into any stored data.

Agreed. I have advised our custodial staff - that no one, NO ONE - gets into our telecomm rooms without approval from me or someone in my chain-of-command. I don't care what they say or who they claim to be.

20 posted on 05/11/2020 10:04:33 AM PDT by Fury
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-36 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson