Security researcher Bjorn Ruytenberg revealed a new method to breach computers via the Thunderbolt 3 interface, affecting many Windows, Mac and Linux systems made before 2019. The attack requires physical access to the computer, but can access data even if the computer’s disk is fully encrypted. Thunderbolt 3 is a fast data interface with an oval shaped port compatible with USB-C connectors that was first embraced by Apple in 2011 and later by some Windows PC manufactures. It has become very popular for multipurpose connections. A single Thunderbolt plug can connect power, external displays, network adaptors, storage systems, and a multitude of other peripherals. Ruytenberg stated that there are seven vulnerabilities uncovered in the Thunderbolt design but only in computers made before 2019. Intel stated a Kernal Direct Memory Access (DMA) protection was designed to thwart “Thunderspy” type attacks but was not implemented in computers made before 2019. All an attacker would need is is “5 minutes alone with the computer, a screwdriver, and some easily portable hardware” according to Ruytenberg.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security