Apple computers vulnerable to 'Thunderstrike 2' firmware worm

The improved attack highlights ongoing concerns over the security of a computer's low-level code

Some Apple computers are vulnerable to a firmware attack that could install difficult-to-remove malware, according to research to be presented at the Black Hat conference on Thursday.

Some Apple computers are vulnerable to a firmware attack that could install difficult-to-remove malware, according to research to be presented at the Black Hat conference on Thursday.

An improved attack on the firmware in Apple computers makes them vulnerable to hard-to-detect malware without even being connected to a network, according to a Black Hat conference presentation due to be given later this week.

The new research highlights ongoing weaknesses in the low-level software that runs on every computer before an operating system is loaded.

It comes from researchers Xeno Kovah and Corey Kallenberg of LegbaCore and Trammell Hudson of Two Sigma Investments. They showed earlier this year how they could infect a Mac's firmware with malware by connecting malicious devices to them using Thunderbolt, Apple's high-speed data transfer interface. The attack was dubbed Thunderstrike.

On Thursday, they will unveil Thunderstrike 2, an attack that improves on the former since it can spread to other machines through removable peripherals.

Their attack uses several vulnerabilities in firmware used by Apple. The company patched some of the flaws in June, but some remain, Hudson wrote on his blog.

In theory, firmware shouldn't be able to be modified or rewritten. Malware that sits within firmware is particularly dangerous since security products don't check the integrity of firmware, meaning users would have no idea it has been tampered with.

The Thunderstrike 2 attack uses a local root privilege exploit that loads a kernel module and gives it access to raw memory, according to a two-minute preview video posted by the researchers on YouTube.

In some cases, the attack code can immediately unlock and rewrite the boot flash firmware. In other instances it can take advantage of a problem when a computer is put into sleep mode and then resume running, a problem that has been explored by another researcher.

The malware can write itself to the Option ROMs of removable Thunderbolt peripherals. If an infected peripheral is inserted into another Mac, the Option ROM is executed before the OS's kernel launches.

It can't tamper with the firmware just yet, though. It has to wait for the computer to go to sleep and wake up again. After that happens, the boot flash isn't protected anymore, and Thunderstrike 2 can write itself to the firmware.

"Once installed in the boot flash, it is very difficult to remove since it controls the system from the very first instruction executed upon booting," the video says. "This includes the keys for updating the firmware."

Reinstalling the OS won't remove the malware and neither will replacing the hard drive.

The attack could be used to reach computers that have been intentionally isolated for security reasons. For example, a Mac could be infected using a Web-based attack. Then, Thunderstrike 2's code could infect a Thunderbolt peripheral. If that device is then inserted into an air-gapped machine, it's infected.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags ApplesecurityLegbaCoreExploits / vulnerabilities

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?