Are Thunderbolt-enabled computers without Thunderbolt ports vulnerable to Thunderspy?

Could these two attack scenarios exploit the recently publicized vulnerability?

Using a Thunderbolt adapter like an USB-to-Thunderbolt adapter on a computer without any Thunderbolt port
Temporarily replacing hardware (mainboard) with har… Continue reading Are Thunderbolt-enabled computers without Thunderbolt ports vulnerable to Thunderspy?

This Week in Security: Thunderspy, Facebook Breaking Everything, and More

Thunderspy was announced this week, developed by [Björn Ruytenberg]. A series of attacks on the Thunderbolt 3 protocol, Thunderspy is the next vulnerability in the style of Inception, PCILeech, and Thunderclap.

Inception and PCILeech were attacks on the naive Direct Memory Access (DMA) built into Firewire, Thunderbolt 1, and PCIe. …read more

Continue reading This Week in Security: Thunderspy, Facebook Breaking Everything, and More

Thunderspy Attack Affects all Computers with Thunderbolt Released in the Past Decade

A slew of seven vulnerabilities identified in the Thunderbolt port allow an attacker with physical access to the device to bypass all security, no matter the platform. It affects all laptops and computers built since 2011. The vulnerabilities, known co… Continue reading Thunderspy Attack Affects all Computers with Thunderbolt Released in the Past Decade

Millions of Thunderbolt-Equipped Devices Open to ‘ThunderSpy’ Attack

If an attacker can get his hands on a Thunderbolt-equipped device for five minutes, he can launch a new data-stealing attack called “Thunderspy.” Continue reading Millions of Thunderbolt-Equipped Devices Open to ‘ThunderSpy’ Attack