Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

Thunderspy, New Attack Method, Allows Hackers to Steal Data in Less than 5 Minutes

Gaps in Cybersecurity Programs
May 13, 2020

Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he's calling Thunderspy - which targets devices with a Thunderbolt port. 

Thunderbolt, explains Ruytenberg, is a high-bandwidth interconnect promoted by Intel and included in laptops, desktops, and other systems. Being PCIe-based, Thunderbolt devices possess Direct Memory Access (DMA)-enabled I/O, he says. In an evil maid DMA attack, where adversaries obtain brief physical access to the victim system, Thunderbolt has been shown to be a viable entry point in stealing data from encrypted drives and reading and writing all of system memory, he adds. In response, Intel introduced Security Levels, a security architecture designed to enable users to authorize trusted Thunderbolt devices only and is said to provide “cryptographic authentication of connections” to prevent devices from spoofing user-authorized devices.

Ruytenberg presented Thunderspy, a series of attacks that break all primary security claims for Thunderbolt 1, 2, and 3. So far, he found the following vulnerabilities:

  1. Inadequate firmware verification schemes
  2. Weak device authentication scheme
  3. Use of unauthenticated device metadata
  4. Downgrade attack using backwards compatibility
  5. Use of unauthenticated controller configurations
  6. SPI flash interface deficiencies
  7. No Thunderbolt security on Boot Camp

Thunderspy is stealth, meaning that you cannot find any traces of the attack, notes Ruytenberg - it does not require your involvement, i.e., there is no phishing link or malicious piece of hardware that the attacker tricks you into using. Ruytenberg warns that the attack works even if you follow best security practices by locking or suspending your computer when leaving briefly, and if your system administrator has set up the device with Secure Boot, strong BIOS and operating system account passwords, and enabled full disk encryption. All the attacker needs is 5 minutes alone with the computer, a screwdriver, and some easily portable hardware, claims Ruytenberg.

Ruytenberg notes that the Thunderspy vulnerabilities cannot be fixed in software, impact future standards such as USB 4 and Thunderbolt 4, and will require a silicon redesign. He encourages users to determine whether they are affected using Spycheck, a free and open-source tool he and other researchers have developed that verifies whether their systems are vulnerable to Thunderspy. If it is found to be vulnerable, Spycheck will guide users to recommendations on how to help protect their system.

Hank Schless, Senior Manager, Security Solutions at Lookout, says, "Whether on a laptop or a mobile device, direct access to the device gives the attacker free rein to load malware. In the case of mobile, the most likely attack chain would be to jailbreak the device and load spyware or surveillanceware. These types of malware give the attacker direct access to everything on the device, including the ability to log keystrokes, steal logins to corporate apps, and steal other personal data."

Any time someone requests physical access to your device, whether a laptop, phone, or tablet, there is cause for concern, he says. "Being able to load a malicious payload directly to the device bypasses many security tools with the attacker leaving no trace of meddling with the device. Even something as simple as a stranger asking to charge their device on your laptop could be a way for them to load malware. In order to protect themselves, consumers should always have their devices in their possession and not let anyone they don't know have access to their device," he adds. 

Attacks like this that have to take place in-person can pose just as much of a threat to an organization as over-the-air attacks, Schless notes. "If employees are frequently on the road, they are constantly handing their phones and laptops over to border agents. Sometimes, those devices are taken out of sight by an agent and returned in what seems like the same state, but in the case of a mobile phone or tablet it could have easily been jailbroken and had spyware loaded on without the user's knowledge," he says.

Enterprises, he claims, should ensure that devices have endpoint security on them, whether for mobile devices or for laptops, that can check the health of the device before allowing it to access corporate infrastructure. "With this capability, the device will be blocked from accessing anything internal to the organization if it's flagged for being infected with malware," Schless explains. "The entire organization is protected, and IT and security teams are alerted that the device is infected and can put policies in place for next steps according to their corporate security posture."

Alex Useche, Senior Consultant at nVisium, notes that if an attacker can use Thunderspy to access your laptop account, they would be able to access all your files and even impersonate your accounts, as applications like Outlook rarely require users to re-enter their credentials. "The impact is much more significant if your laptop logs in to the internal network automatically without requiring additional authentication, as now attackers have access to your company's data," Useche says. "Consumers who misplace and lose their laptops at a public place may often find comfort on the fact that their laptops are at least secured by a password. Thunderspy throws that protection out the window. This is especially true in cases where the only password needed to access a user's files in the Windows password. As a result, it becomes even more necessary to avoid leaving laptops unattended, whether at a public space, at the office, or even a hotel room."

For more information, please visit Björn Ruytenberg's blog at https://thunderspy.io/

KEYWORDS: cyber security data protection device management malware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • SEC0819-5G-Feat-slide_900px

    Attackers can exploit vulnerabilities in new 5G networks to steal subscriber data and impersonate users

    See More
  • Doctor-holding-stethoscope.jpg

    Less than 1 in 5 U.S. clinics are protected against phishing

    See More
  • Malware

    Hackers are Targeting Piracy Apps to Install Malware and Steal Data

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • into to sec.jpg

    Introduction to Security, 10th Edition

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing