And then the bags of Aeolus were opened…
The vulnerability affects millions of electronic systems, as research by the University of Eindhoven says that if a hacker manages to gain access to a machine in just five minutes, he could bypass all login methods to gain full access to the victim's data.
The doors Thunderbolt are available on machines running Windows, Linux and macOS. Ruytenberg reported that all versions of the technology Thunderbolt released between 2011 and 2020 are affected. The worst part is that the vulnerability cannot be fixed with any update. THE Intel will have to redesign technology to correct these defects.
So you can not do too much. However, with the open source software Thunderspy, developed by Ruytenberg and his team, you can check if you are affected by the error Thunderbolt.
These tools are available for Windows and Linux systems. There is currently no tool available for macOS users.
How to control your computer:
From official page of Thunderspy Click on "Thunderspy for Windows" to download the tool.
Open the Zip and put the application where you want. Double-click the Spycheck icon to run the tool.
Select the language and accept the GPLv3 open-soruce license.
The Thunderspy tool will then try to locate the controller Thunderbolt in your system. During the process, the tool may ask you to install some additional drivers or enter power saving mode.
After checking your system, the Thunderspy tool will give you a summary of the analysis. You can click on "Report" for a more detailed report.
From the official Thunderspy page click on "Thunderspy for Linux" to download the tool.
Open a terminal in the folder that contains the tool and run sudo python3 spycheck.py.
You must have root privileges to run the command.
After you run the command, Spycheck will show you a detailed report. You can export the report in JSON format using the command "-o onoma-arxeiou.json"
There is nothing you can do to fix these vulnerabilities. This way you should not use unknown devices Thunderbolt or leave your computer alone without watching it in public. Turn your system off or on when you move away from it instead of putting it in sleep mode.