View Single Post
  #3  
Old May 12th 20, 04:42 PM posted to alt.os.linux,alt.comp.os.windows-10,microsoft.public.windowsxp.general
Arlen Holder[_8_]
external usenet poster
 
Posts: 21
Default Thunderspy: Thunderbolt Flaws Expose Millions of PCs to Hands-On Hacking (aka "evil maid attack")

UPDATE:
FYI: Here is an update from ZDNet for Windows & Linux users on this ng...

o *Windows*:
"Microsoft implemented kernel DMA protection in Windows 1803...
o *Linux*:
"Linux kernel 5.x and later... also include kernel DMA protection."

Details here...
o *Thunderbolt vulnerabilities can let attacker with physical access steal data*
https://www.zdnet.com/article/thunderbolt-flaws-affect-millions-of-computers-even-locking-unattended-devices-wont-help/

"A Dutch researcher has detailed nine attack scenarios that work
against all computers with Thunderbolt shipped since 2011 and which
allow an attacker with physical access to quickly steal data from
encrypted drives and memory."

"The attacks work even when users follow security best practice,
such as locking an unattended computer, setting up Secure Boot,
using strong BIOS and operating system account passwords,
and enabling full disk encryption."

"The technology is vulnerable to this type of attack because the
Thunderbolt controller ¡V a PCIe device ¡V has DMA, which can allow
an attacker to access system memory via a connected peripheral."

"While all Thunderbolt-equipped computers are vulnerable to Thunderspy,
Intel, which develops Thunderbolt technology, says the attacks were
mitigated at the operating-system level with Kernel Direct Memory Access
(DMA) protection, but this technology is limited to computers sold
since 2019."
--
This is simply to inform you of the high-level news; for more information,
once you're aware of the news, you can click the links (for more details).
Ads