Firmware Bug in OSX Could Allow Installation of Low-Level Rootkits
https://www.ispeech.org/text.to.speech
There is a vulnerability buried deep in the firmware of many Apple laptops that could allow an attacker to overwrite the machineâs BIOS and install a rootkit, gaining complete control of the Mac.
The vulnerability lies in the UEFI system on some older MacBooks, and researcher Pedro Vilaca discovered that after a MacBook is put to sleep and then brought back up, the machineâs low-level firmware is left unlocked.
âAnd you ask, what the hell does this mean? It means that you can overwrite the contents of your BIOS from userland and rootkit EFI without any other trick other than a suspend-resume cycle, a kernel extension, flashrom, and root access,â Vilaca wrote in an explanation of the vulnerability and attack.
The attack is somewhat similar to one known as Thunderstrike
âSince it is the first OS X firmware bootkit, there is nothing currently scanning for its presence. It controls the system from the very first instruction, which allows it to log keystrokes, including disk encryption keys, place backdoors into the OS X kernel and bypass firmware passwords,â Hudson said in January. âIt canât be removed by software since it controls the signing keys and update routines. Reinstallation of OS X wonât remove it. Replacing the SSD wonât remove it since there is nothing stored on the drive.â
By email, Vilaca said that the issue he discovered is more concerning than the Thunderstrike attack.
[adsense size='1']
âAnyone who has developed Thunderstrike like capabilities can exploit this bug right away with minimal effort. Itâs more powerful than Thunderstrike because it allows remote attack vectors while Thunderstrike is mostly a local and physical attack to the target machines,â he said via email.
Vilaca said in his analysis that he has tested the attack on a MacBook Pro Retina, a MacBook Pro 8.2, and a MacBook Air, all running the latest available version of the EFI. The vulnerability can be exploited remotely, Vilaca said.Â
âThe bug can be used with a Safari or other remote vector to install an EFI rootkit without physical access. The only requirement is that a suspended happened in the current session. I havenât researched but you could probably force the suspend and trigger this, all remotely. Thatâs pretty epic ownage,â Vilaca said.
He added that he believes Apple may know about this vulnerability already, as it doesnât seem to be present on machines sold after about the middle of 2014.Â
âThe issue at stake is that I believe Apple has a corporate culture problem regarding security (like Microsoft had many years ago) and they only seem to react when pushed against a corner. If they indeed knew about the bug â because I donât believe itâs a coincidence not working in latest machines â then they keep their pattern of not patching older versions,â Vilaca said. Â
[adsense size='1']
âThis is a bad policy and at least if they want to put it in practice at least be straightforward with customers and warn them about the issues. People can then take informed decisions about their risks. Of course this is wishful thinking and they will not shoot their own foot coming forward with things like this. But thatâs a philosophical discussion about management around the world and why itâs so wrong these days.â
Tagged with: allow ⢠could ⢠firmware ⢠installation ⢠level ⢠rootkits
đ Your Account
đ Email Subscriptions
-
-
Donate Via Wallets
-
MetaMask
-
Trust Wallet
-
Binance Wallet
-
WalletConnect
-
-
Popular
New Emerging APT Threat Exploiting WinRAR Flaw by Admin November 16, 2023 î Nov 16, 2023î NewsroomAdvanced Persistent Threat / Zero-Day A hacking group… (8)
CISA Has a New Road Map for Handling Weaponized AI by Admin November 15, 2023 Last month, a 120-page United States executive order laid out… (7)
WordPress UserPro 5.1.x Password Reset /… by Admin November 22, 2023 Vulnerability Details & Technical AnalysisPassword Reset to Privilege Escalation using… (6)
Researchers Unveal GuLoader Malware’s Latest… by Admin December 9, 2023 î Dec 09, 2023î NewsroomMalware / Cyberattack Threat hunters have unmasked the… (6)
âď¸Social Media
đĽMembers
-
registered 2 days, 9 hours ago
-
registered 2 days, 14 hours ago
-
registered 2 days, 14 hours ago
-
registered 3 days, 7 hours ago
-
registered 3 days, 8 hours ago
-
đ Forum Groups
-
active 2 days, 9 hours ago
-
active 2 days, 9 hours ago
-
active 2 days, 9 hours ago
-
active 2 days, 9 hours ago
-
active 2 days, 9 hours ago
-
Gloss