Apple computers vulnerable to 'Thunderstrike 2' firmware worm

The improved attack highlights ongoing concerns over the security of a computer's low-level code

Some Apple computers are vulnerable to a firmware attack that could install difficult-to-remove malware, according to research to be presented at the Black Hat conference on Thursday.

Some Apple computers are vulnerable to a firmware attack that could install difficult-to-remove malware, according to research to be presented at the Black Hat conference on Thursday.

An improved attack on the firmware in Apple computers makes them vulnerable to hard-to-detect malware without even being connected to a network, according to a Black Hat conference presentation due to be given later this week.

The new research highlights ongoing weaknesses in the low-level software that runs on every computer before an operating system is loaded.

It comes from researchers Xeno Kovah and Corey Kallenberg of LegbaCore and Trammell Hudson of Two Sigma Investments. They showed earlier this year how they could infect a Mac's firmware with malware by connecting malicious devices to them using Thunderbolt, Apple's high-speed data transfer interface. The attack was dubbed Thunderstrike.

On Thursday, they will unveil Thunderstrike 2, an attack that improves on the former since it can spread to other machines through removable peripherals.

Their attack uses several vulnerabilities in firmware used by Apple. The company patched some of the flaws in June, but some remain, Hudson wrote on his blog.

In theory, firmware shouldn't be able to be modified or rewritten. Malware that sits within firmware is particularly dangerous since security products don't check the integrity of firmware, meaning users would have no idea it has been tampered with.

The Thunderstrike 2 attack uses a local root privilege exploit that loads a kernel module and gives it access to raw memory, according to a two-minute preview video posted by the researchers on YouTube.

In some cases, the attack code can immediately unlock and rewrite the boot flash firmware. In other instances it can take advantage of a problem when a computer is put into sleep mode and then resume running, a problem that has been explored by another researcher.

The malware can write itself to the Option ROMs of removable Thunderbolt peripherals. If an infected peripheral is inserted into another Mac, the Option ROM is executed before the OS's kernel launches.

It can't tamper with the firmware just yet, though. It has to wait for the computer to go to sleep and wake up again. After that happens, the boot flash isn't protected anymore, and Thunderstrike 2 can write itself to the firmware.

"Once installed in the boot flash, it is very difficult to remove since it controls the system from the very first instruction executed upon booting," the video says. "This includes the keys for updating the firmware."

Reinstalling the OS won't remove the malware and neither will replacing the hard drive.

The attack could be used to reach computers that have been intentionally isolated for security reasons. For example, a Mac could be infected using a Web-based attack. Then, Thunderstrike 2's code could infect a Thunderbolt peripheral. If that device is then inserted into an air-gapped machine, it's infected.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags ApplesecurityLegbaCoreExploits / vulnerabilities

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Armand Abogado

HP OfficeJet 250 Mobile Printer

Wireless printing from my iPhone was also a handy feature, the whole experience was quick and seamless with no setup requirements - accessed through the default iOS printing menu options.

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?