Apple MacBook Users, Meet Thunderstrike: New Nightmare Malware for You and Your Laptop

XxStarzxX Jan 10, 2015

  1. XxStarzxX

    XxStarzxX Banned! BANNED
    205/282

    Joined:
    Mar 3, 2012
    Messages:
    6,119
    Likes Received:
    1,136
    Trophy Points:
    205
    Gender:
    Male
    Location:
    XPG
    Console:
    Xbox One
    Apple MacBook users are not safe from malware attacks anymore as a new security flaw in its thunderbolt ports may leave the laptops vulnerable.

    The flaw in the ports enables the writing of a custom code in the MacBook's boot ROM.

    Tramell Hudson, a security expert, has found a method by which it is possible to install malicious code on a built-in chip on MacBooks: Thunderstrike is the new nightmare for you and your laptop.

    Thunderstrike cannot be detected, and there is no known method (unless one uses specialized hardware) available, which would eliminate the nearly impossible to remove malware. If there is an attempt to remove the hard disk, the malware will still remain.

    [​IMG]

    How does the Thunderstrike malware work?

    By using an infected host, hackers can install a rootkit via the flawed Thunderbolt port. The BIOS or firmware is targeted. Once the rootkit is installed, it is able to infect other devices using the internal Thunderbolt interface on the Mac. In this manner, the infection can spread between different devices.

    Attackers are able to write untrusted codes onto the SPI flash ROM on the motherboard of the device. Currently, there are no available cryptographic firmware checks available when a device boots. Therefore, the malicious code is able to control the device from the initial instruction and manages to go undetected.

    "Since it is the first OS X firmware bootkit, there is nothing currently scanning for its presence. It controls the system from the very first instruction, which allows it to log keystrokes, including disk encryption keys, place backdoors into the OS X kernel and bypass firmware passwords," noted Hudson.

    Even if the OS is reinstalled, Hudson said, the malware will persist as the boot ROM is not dependent on the OS of a device. The only way to remove Thunderstrike is via another Thunderbolt device, which may restore the flash ROM to the original configuration.

    Hudson revealed the proof-of-concept attack on MacBooks at the annual Chaos Communication Congress in December 2014 in Germany.

    The damage caused by Thunderstrike is enormous. It can compromise the entire OS as it boots, log passwords and allow remote access to data, which is normally not accessible from the firmware.

    According to Hudson, Apple is apparently pushing out a "partial fix" for the vulnerability, which will come as a firmware update. This update will not allow the malicious code to be written on the ROM in some scenarios.
     
  2. losparo

    losparo Moderator Staff Member XPG Moderator TeamXPG
    380/564

    Joined:
    Dec 16, 2012
    Messages:
    2,060
    Likes Received:
    7,244
    Trophy Points:
    380
    Gender:
    Male
    Console:
    Playstation 4
    Interesting post, hopefully a fix will be found soon. nice share mate ;)
     
  3. Iamcoolz

    Iamcoolz Forum Administrator Staff Member XPG Administrator
    205/282

    Joined:
    Mar 30, 2012
    Messages:
    1,227
    Likes Received:
    507
    Trophy Points:
    205
    Gender:
    Male
    Location:
    XPG
    Console:
    Xbox One
    ... such malware, such wow. I suppose if I go up to my friends windows laptop, put a thumb drive into it, run a rootkit program onto it, pull out the thumb drive. Same principle.
     

Share This Page

Close