What was designed to be a tool for transferring data at faster speeds is now found to be anything but a convenient advancement. The Thunderbolt cable by Apple allows one computer system to connect to another for system migration or connects an external storage device to a host system. A security researcher recently found that hackers can steal data from Thunderbolt-equipped PCs or Linux computers even if the computer is locked.
Uses for Thunderbolt Technology
Thunderbolt technology is a somewhat newer development in device connectivity. It allows you to add several devices to your computer through multiple cords. The overarching goal of the technology is to support fast data transfer. The original Thunderbolt can transfer at speeds of 10Gb per second while Thunderbolt 2 can connect channels at 20Gb per second. The Thunderbolt 3 is the newest addition to the family with a 40Gb per second transfer rate and 100 watts of power to charge laptops and smartphones.
The Thunderbolt cables are used in a variety of ways to make the computer user’s experience better:
Security Concerns with the Fast and Furious Connection
Both Macs and PCs are equipped to handle Thunderbolt connectivity, which unfortunately means both machines are vulnerable to its security flaw. According to 9to5 Mac, at least seven serious security flaws have been identified in Thunderbolt ports and Thunderbolt-compatible USB-C ports used on the more advanced Mac machines. Security researcher Bjorn Ruytenberg found the following issues in Intel’s Thunderbolt chips:
Ruytenberg explained that hackers could utilize a method known as “Thunderspy” where an attacker uses a screwdriver and portable hardware to gain physical access to your machine. The malicious actor could then change the firmware that controls the Thunderbolt port, giving access to any device. The worst part is a user won’t even know that their host device has been altered.
This only affects PCs such as Dell, HP, Lenovo, though Apple computers that run Boot Camp and a Mac OS are also vulnerable. The vulnerabilities allow an attacker to bypass the first level of security and compromise the authenticity of Thunderbolt metadata in the Mac OS system information. An attacker could even permanently disable Thunderbolt security and block any future firmware updates.
Protecting Devices from Unauthorized Access
The security flaws are present in the controller chips in the computer, meaning that a software update would not be able to fix the problem. Intel has created a Thunderbolt security system called Kernel Direct Memory Access Protection that would prevent a Thundespy attack. This level of protection is only available on computers that were manufactured in 2019 and later. That is a huge blow to PC users with older host devices as well as Mac users whose computers that were shipped between 2011 and 2020.
In order to protect themselves from these types of attacks, users should abide by the following suggestions:
The ideal way to protect your critical data is to use a hardware encrypted SecureDrive BT. The device is FIPS 140-2 Level 3 Validated, meaning it was tested in a government facility to ensure security. The device itself has parts coated in epoxy, so even if a hacker stole the device, they would not be able to reverse engineer the drive or steal your information. The BT drive can only be accessed through our secure mobile app, including biometric authentication through fingerprints or facial recognition.
With security features like Step-Away AutoLock and inactivity AutoLock, your device will be protected from unauthorized access, even when your device is plugged into the computer. You can avoid data transfer concerns with flawed Thunderbolt technology and share data via the SecureDrive, which offers read-only mode so data on the drive cannot be altered. Learn more about how the SecureDrive technology is the safest data storage on the market by calling 1-800-875-3230.