Hackers Need 5 Minutes to Steal Data From Thunderbolt-equipped Devices

Flaws in the protocol security measures of Thunderbolt have been found. All Thunderbolt-equipped devices manufactured before 2019 are vulnerable.

Weak device authentication schemes, insufficient firmware verification schemes, and the use of metadata of unauthenticated devices open the door for hackers.

The only way to prevent attacks is to disable Thunderbolt ports from within BIOS.

de_DEDeutsch
en_USEnglish de_DEDeutsch