Hacking

Thunderclap vulnerabilities allows to hack most of moder computers

Researchers found a new set of flaws that can be exploited via Thunderbolt to compromise a broad range of modern computers with Thunderclap attacksResearchers found a new set of flaws that can be exploited via Thunderbolt to compromise a broad range of modern computers with Thunderclap attacks

Security experts from Rice University in the United States, University of Cambridge in the United Kingdom, and SRI International, have discovered a new set of security vulnerabilities that can be exploited by attackers via Thunderbolt, the hardware interface created by Apple and Intel for connecting peripheral devices to a computer. 

The attack was dubbed by the researchers Thunderclap,

“The Thunderclap vulnerabilities are security flaws that affect the way modern computers interact with peripheral devices such as network cards, storage, and graphics cards.” the researchers explained.

“These vulnerabilities allow an attacker with physical access to a Thunderbolt port to compromise a target machine in a matter of seconds, running arbitrary code at the highest privilege level and potentially gaining access to passwords, banking logins, encryption keys, private files, browsing and other data.”

The flaws affect all major operating systems, including Windows, macOS, Linux, and FreeBSD, they could be exploited by attackers to bypass protection mechanisms implemented against DMA attacks.

Direct memory access (DMA) attacks allow attackers to compromise a computer by simply plugging in a malicious hotplug device (i.e. a mouse, keyboard, storage) into Thunderbolt 3 port or the latest USB-C port.

The researchers explained that it is also possible to exploit the flaws through devices connected via PCI Express or chips directly soldered to the motherboard.

Attackers leverage the Thunderbolt port to allow connected devices to bypass operating system security policies and directly read/write the content of the system memory.

The attackers can create infected devices to manipulate the contents of the memory and execute arbitrary code with the highest privileges.

The latest generation of operating systems leverages Input/Output Memory Management Unit (IOMMU) protection technique to prevent DMA attacks. The technique implements the control of the accesses made by peripheral devices to the memory.

Unfortunately, the researchers discovered a set of flaws that could allow attackers to bypass IOMMU protection and access portions of the memory they want.

Some Windows and Linux systems mitigate Thunderclap attacks through the Thunderbolt access control mechanism that prompts users when a device is connected. Experts argued the prompt is not displayed if the attack is carried out via a PCI Express peripheral.

Users should not connect devices they do not know the origin or do not trust.

“Our work leverages vulnerabilities in operating system IOMMU usage to compromise a target system via DMA, even in the presence of an IOMMU that is enabled and configured to defend against DMA attacks. The novel Thunderclap security evaluation platform, built on field-programmable gate array (FPGA) hardware, mimics the functionality of a legitimate peripheral device to convince a target operating system to grant it access to regions of memory.” wrote the researchers.

“It then examines those regions of memory to find a rich and nuanced attack surface of vulnerable structures that can be exploited to take control of the system.”

The situation is worse because the IOMMU security mechanism is not enabled by default on most operating systems. Another factor of concern is that modern devices have USB-C extending potential impact of DMA attacks also to non-Apple devices using Thunderbolt 3 ports.

Experts shared their findings with major OS and hardware vendors that quickly implemented mitigation to address the Thunderclap vulnerabilities.

“In macOS 10.12.4 and later, Apple addressed the specific network card vulnerability we used to achieve a root shell,” researchers said. “Recently, Intel has contributed patches to version 5.0 of the Linux kernel.” continue the experts.

“The FreeBSD Project indicated that malicious peripheral devices are not currently within their threat model for security response.”

Anyway, on vulnerable machines, the best way to mitigate such kind of attacks is to disable the Thunderbolt ports.

Expert provided technical details on the vulnerabilities in a research paper, they also developed a proof-of-concept attacking hardware that can exploit the ThunderClap vulnerabilities on targeted systems, but they did not release it at this time.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – Thunderclap, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

10 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

12 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

23 hours ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

1 day ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

1 day ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

1 day ago

This website uses cookies.