Thunderbolt flaws left millions of PCs exposed to hackers
The Thunderspy attack takes less than 5 mins to pull off without even having physical access to the device and can affect ant PC manufactured before 2019
A laptop left alone with a hacker for more than a few minutes should be considered compromised, security paranoiacs have warned for years. Now a Dutch researcher has shown how "that sort of physical access hacking can be pulled off in an ultra-common component - the Intel Thunderbolt port found in millions of PCs".
A researcher from Eindhoven University of Technology, Björn Ruytenberg, revealed the details of a new attack method he's calling Thunderspy. On Thunderbolt-enabled Windows or Linux PCs that have been manufactured before 2019, Thunderspy can "bypass the login screen of a sleeping or locked computer—and even its hard disk encryption—to gain full access to the computer's data".
While Ruytenbetg's attack "may require opening a target laptop's case with a screwdriver, it leaves no trace of intrusion, and can be pulled off in just a few minutes.
This opens the new avenue to something the security industry calls "evil maid attack", which is basically a threat every time a hacker gets some alone time with a computer in a hotel room, for instance. "Ruytenberg says there's no easy software fix, only disabling the Thunderbolt port altogether," Wired explains.
"All the evil maid needs to do is unscrew the backplate, attach a device momentarily, reprogram the firmware, reattach the backplate, and the evil maid gets full access to the laptop," says Ruytenberg. The researcher plans to present his Thunderspy at the Black Hat security conference this summer.
"All of this can be done in under five minutes."
Security researchers have long been wary of Intel's Thunderbolt interface as a potential security issue, writes Wired. "It offers faster speeds of data transfer to external devices in part by allowing more direct access to a computer's memory than other ports, which can lead to security vulnerabilities".
A collection of flaws in Thunderbolt components known as Thunderclap was revealed by a group of researchers last year that showed that plugging a malicious device into a computer's Thunderbolt port can quickly bypass all of its security measures.
As a remedy, those researchers recommended "that users take advantage of a Thunderbolt feature known as 'security levels', disallowing access to untrusted devices or even turning off Thunderbolt altogether in the operating system's settings. That would turn the vulnerable port into a mere USB and display port".
Ruytenberg's new technique allows "an attacker to bypass even those security settings, altering the firmware of the internal chip responsible for the Thunderbolt port and changing its security settings to allow access to any device. It does so without creating any evidence of that change visible to the computer's operating system".
"Intel created a fortress around this," says Tanja Lange, a cryptography professor at the Eindhoven University of Technology and Ruytenberg's advisor on the Thunderspy research. "Björn has gotten through all their barriers."
After last year's Thunderclap research, Intel has created a security mechanism known as Kernel Direct Memory Access Protection, which prevents Ruytenberg's Thunderspy attack. However, that Kernel DMA Protection is lacking in all computers made before 2019, and is still not standard today. In fact, many Thunderbolt peripherals made before 2019 are incompatible with Kernel DMA Protection.
"In their testing, Eindhoven researchers could find no Dell machines that have the Kernel DMA Protection, including those from 2019 or later, and they were only able to verify that a few HP and Lenovo models from 2019 or later use it,"" Wires wrote. Computers running Apple's MacOS are unaffected.
Ruytenberg is also releasing a tool to determine if your computer is vulnerable to the Thunderspy attack, and whether it's possible to enable Kernel DMA Protection on your machine.
Ruytenberg's technique "requires unscrewing the bottom panel of a laptop to gain access to the Thunderbolt controller, then attaching an SPI programmer device with an SOP8 clip, a piece of hardware designed to attach to the controller's pins. That SPI programmer then rewrites the firmware of the chip—which in Ruytenberg's video demo takes a little over two minutes—essentially turning off its security settings".
"I analysed the firmware and found that it contains the security state of the controller," Ruytenberg says. "And so I developed methods to change that security state to 'none.' So basically disabling all security."
An attacker can then plug a device into the Thunderbolt port that alters its operating system to disable its lock screen, even if it's using full disk encryption, Wired explained.
The full attack Ruytenberg shows in his demo video uses only about $400 dollars-worth of equipment, but requires an SPI programmer device and a $200 peripheral that can be plugged into a Thunderbolt port to carry out the direct memory attack that bypasses the lockscreen, like the AKiTiO PCIe Expansion Box Ruytenberg used.
Ruytenberg argues that a better-funded hacker could build the entire setup into a single small device for around $10,000.
The fact that Thunderbolt remains a viable attack method for evil maids isn't entirely unexpected, says Karsten Nohl, a well-known hardware security researcher and founder of SR Labs, who reviewed Ruytenberg's work. But Nohl said that it should not freak out too many users since it requires a certain level of sophistication and physical access to a victim machine. Nohl, however, was still surprised to see how easily Intel's "security levels" can be bypassed.
"If you're adding an authentication scheme against hardware attacks and then you implement it in unsecured hardware...that's the wrong way to tackle a hardware security problem," says Nohl. "It's a false sense of protection."
"Ruytenberg says there's also a less invasive version of his Thunderspy attack, but it requires access to a Thunderbolt peripheral the user has plugged into their computer at some point. Thunderbolt devices set as 'trusted' for a target computer contain a 64-bit code that Ruytenberg found he could access and copy from one gadget to another. That way he could bypass a target device's lockscreen without even opening the case".
"There's no real cryptography involved here," Ruytenberg says. "You copy the number over. And that's pretty much it."
However, that version of the Thunderspy attack only works, when the Thunderbolt port's security settings are configured to their default setting of allowing trusted devices.
Ruytenberg shared his findings with Intel three months ago. When Wired reached out to the company, Intel responded with a blog post noting - "While the underlying vulnerability is not new, the researchers demonstrated new physical attack vectors using a customized peripheral device".
"In 2019, major operating systems implemented Kernel Direct Memory Access (DMA) protection to mitigate against attacks such as these. This includes Windows (Windows 10 1803 RS4 and later), Linux (kernel 5.x and later), and MacOS (MacOS 10.12.4 and later)," the blog added.
"For all systems, we recommend following standard security practices," Intel added, "including the use of only trusted peripherals and preventing unauthorized physical access to computers."
Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on Whatsapp channel,Twitter, Facebook, Google News, and Instagram. For our latest videos, subscribe to our YouTube channel.