Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Thunderstrike: The scary vulnerability in your Mac's Thunderbolt port
Mashable ^ | JAN 02, 2015 | BY CHRISTINA WARREN

Posted on 01/08/2015 7:21:49 PM PST by Swordmaker


The MagSafe2 port, from left, two Thunderbolt ports, a USB 3 port and headphone port (top),
SDXC Cardslot, HDMI port, and USB 3 port (bottom), on Apple's MacBook Pro.
Similar mage from Apple Inc. substituted for original Getty Image on article site.

According to a recent security presentation, attackers could infect Macintosh computers with a special kind of malware using the computer's Thunderbolt port.

The attack, dubbed Thunderstrike, was showcased by security researcher Trammell Hudson at the Chaos Communications Congress in Germany. Hudson is well known in the security community, particularly for his work reverse-engineering various devices and systems.

You can watch Hudson's entire presentation and read an annotated version of the talk, but the gist is that the attack takes advantage of a Thunderbolt flaw that allows custom code — like a bootkit — to be written to the system using Thunderbolt port.

Thunderstrike takes advantage of a flaw in the Thunderbolt Option ROM that was first disclosed in 2012. Hudson's proof-of-concept goes a number of steps further (past attempts to exploit the flaw by writing new code to the ROM at boot left researchers with bricked machines).

Ultimately, it shows that an attacker could use the Thunderbolt port to install a custom bootkit Ultimately, it shows that an attacker could use the Thunderbolt port to install a custom bootkit. This bootkit could even replicate itself to any other Thunderbolt-attached device, which means it could spread across networks.

The scary thing is that because this code is in its own separate ROM, the attack can't be stopped by re-installing OS X or swapping out the hard drive.

Hudson even showed that he cold replace the cryptographic keys Apple uses for signing firmware with another key, which would prevent future legitimate firmware updates from being installed.

Scary, but there is some good news

Hudson's work is impressive, if scary. Anytime there are vulnerabilities at the lowest levels of system access, users should be concerned about potential threats.

That said, regular users don't need to fear Thunderstrike. As far as Hudson knows, there are no Mac firmware bootkits in the wild. Right now, it exists only as a proof-of-concept.

Apple has already patched part of the vulnerability in the most recent Mac mini and on the iMac with 5K Retina Display.

It should also be noted that this sort of exploit requires physical access to a machine. You can't download the malware through other software.

That said, the nature of this sort of vulnerability just highlights that computer security is as much about access control as it is about passwords and hardened software.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applecomputer; hacker; mac; macintosh; malware; tech; thunderbolt
Navigation: use the links below to view more comments.
first 1-2021-4041-46 next last
Please note this is NOT a remote exploit, and also note it is a proof-of-concept demonstration, not an exploit that is in the wild, at this point. To be able to use this exploit, a malicious intruder MUST have physical access to the computer and plug in a Thunderbolt Device with a maliciously crafted ROM installed in it. This can be accomplished by persuading the user to install the device himself. . . but at this time, there are none in the wild. — Swordmaker
1 posted on 01/08/2015 7:21:49 PM PST by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Swordmaker
Swordmaker, those in the wild may be enough or are we bidding our time, twiddling our thumbs (so to speak)? Unknown here. Know you are knowledgeable of those in the wild ... Any thoughts? If and perhaps does involve National Security, please disregard my post.
2 posted on 01/08/2015 7:26:04 PM PST by no-to-illegals (Scrutinize our government and Secure the Blessing of Freedom and Justice)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
Serious Proofof-Concept Exploit in Mac Thunderbolt port demonstrated at White Hat Hacking conference allows complete take over of the Mac operating system. . . undetectable, unrecoverable. Requires physical possession of the computer to accomplish or persuading the user to plug in an malicious Thunderbolt device. NOTE: this is a PROOF-OF-CONCEPT and is not in the WILD! Apple has already closed part of the vulnerability that allows this exploit in the latest Mac Minis and the new 5K iMacs, but older Macs are at risk. AGAIN NOT IN THE WILD and REQUIRES physical access of your computer to accomplish! — PING!


Apple THUNDERBOLT SECURITY EXPLOIT DANGER Ping!

If you want on or off the Mac Ping List, Freepmail me.

3 posted on 01/08/2015 7:27:23 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
We have all known for years that physical access to a machine is generally game over.

Greater functionality (like loading code through a port) is always paired with potential security issues. Sounds like Apple is addressing them.

It's an interesting demo, but I wouldn't spend a millisecond worrying about it, as long as the machine isn't being physically attacked.

4 posted on 01/08/2015 7:29:22 PM PST by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: everyone

Please disregard my prior post, Everyone.


5 posted on 01/08/2015 7:32:44 PM PST by no-to-illegals (Scrutinize our government and Secure the Blessing of Freedom and Justice)
[ Post Reply | Private Reply | To 2 | View Replies]

To: no-to-illegals
Swordmaker, those in the wild may be enough or are we bidding our time, twiddling our thumbs (so to speak)? Unknown here. Know you are knowledgeable of those in the wild ... Any thoughts? If and perhaps does involve National Security, please disregard my post.

As far as is known, this exploit is NOT in the wild at this time. . . but now that it has been demonstrated, it is only a matter of time. The saving grace is that it requires the malicious hacker to have physical access to your computer to accomplish this hack. . . but once it is done, there is NO WAY for the user to know it was done! There is no way for the user to recover aside from having the system ROMs re-flashed. . . which is something very difficult to do. Don't let your maid have access to your computer. LOL. . . of trust your household workers very well. . . not to mention your friends!

It is possible that the NSA knows about this already. . . and could have compromised computers. However, there were already means to do this without involving Thunderbolt if one had physical access to the computer. For example, with physical access, hardware bugs could be installed in the computer, mouse, cables or keyboard that would accomplish the same things. This is just one more level more sneaky.

6 posted on 01/08/2015 7:33:34 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker
> ...persuading the user to plug in an malicious Thunderbolt device...

Very interesting. The chances are non-zero that a malicious manufacturer, or a manufacturer whose production line has been compromised, could produce Thunderbolt products that might fit that description. They wouldn't even have to persuade the user -- hell, the user would pay for the privilege of getting pwned, by purchasing the compromised device.

Hmmmm. Maybe I'll reconsider my comment above....

7 posted on 01/08/2015 7:33:48 PM PST by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: no-to-illegals
Please disregard my prior post, Everyone.

Your question was a good one. It deserved an answer.

8 posted on 01/08/2015 7:34:48 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Swordmaker

Thank You ... Lord, we’ll never round up all the suspects ... Don’t want to be an alarmist so will remain quiet as best as can ... which usually isn’t too quiet. Appreciate the info!


9 posted on 01/08/2015 7:36:45 PM PST by no-to-illegals (Scrutinize our government and Secure the Blessing of Freedom and Justice)
[ Post Reply | Private Reply | To 6 | View Replies]

To: dayglored

This article’s got me wondering about potential USB exploit vulnerabilities on shared computers at, for example, your local library. My local branch kept having its wifi ID changed by the kids until I showed the librarian how to set the router’s admin password to something other than the factory default.


10 posted on 01/08/2015 7:43:36 PM PST by Bob (Violence in islam? That's not a bug; it's a feature.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: dayglored
Hmmmm. Maybe I'll reconsider my comment above....

It would not happen for long. . . the reviewers would discover the ploy and the company who was selling such a device would be sued out of business. Apple is closing the vulnerability even as we speak by doing certificate and check-sum checking routines on something that had not been thought necessary before. That should put a stop to this particular approach. They are also closing off changing of the ROMs during boot up of Thunderbolt devices to further close the door to this exploit. All common sense revisions to the system.

I wonder if anyone has gone through the USB and other ports looking for similar possibilities with a fine-tooth comb? I note that someone has discovered that Android devices using Thunderbolt are also susceptible to this exploit as it is inherent in the Thunderbolt standard developed by Intel. That probably means that any computer using a Thunderbolt interface has the same problem.

11 posted on 01/08/2015 7:44:00 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Bob
This article’s got me wondering about potential USB exploit vulnerabilities on shared computers at, for example, your local library. My local branch kept having its wifi ID changed by the kids until I showed the librarian how to set the router’s admin password to something other than the factory default.

LOL!

12 posted on 01/08/2015 7:45:09 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Swordmaker

Swordmaker, I know your business involves all the operating systems, and that you are our go-to-guy when we get in trouble, or are scared by all the FUD being tossed around out there in the wild west of the internet.

I have a question. It seems to me that there is a ratcheting up of all these “scare” articles about Macs/Apple/and their OS. I am wondering why.

This is probably a philosophical or political question, and may be impossible to answer. But, do you have any opinions?

Could it be related to Apple’s decision to make it impossible for .gov to get our info from them? Or, do they not pay enough in “tribute” to .gov? Or, is it just corporate competition between “brands”?

I just can’t understand the food fights on FR over the choice of which Computer/Operating System to use. It is as bad as “the Hatfields and McCoys”, and equally pointless, since people and businesses have uniquely different budgets, requirements, and needs. One size or system cannot work for all.

Your thoughts would be much appreciated.


13 posted on 01/08/2015 7:48:16 PM PST by jacquej ("You cannot have a conservative government with a liberal culture." (Mark Steyn))
[ Post Reply | Private Reply | To 3 | View Replies]

To: dayglored

I’ve seen speculation that e-cigarettes plugged into a USB port for charging could be used to infect a machine. Since I only charge mine with an AC charger, I can only hope that PG&E doesn’t pick up any malware from it. :=)


14 posted on 01/08/2015 7:51:03 PM PST by Bob (Violence in islam? That's not a bug; it's a feature.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker

The last ID that the kids set was “My butt claps”. Things could have gotten much, much worse.


15 posted on 01/08/2015 7:56:20 PM PST by Bob (Violence in islam? That's not a bug; it's a feature.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Swordmaker

i’m good.....:o)

Stay Safe ........


16 posted on 01/08/2015 8:04:19 PM PST by Squantos ( Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dayglored

You’re right about physical access, but most users don’t think that plugging in that new external hard drive they just bought could be a security risk. Back a few months ago when FTDI was threatening to brick machines using counterfeit USB chips, they were concerned with IP and lost revenue from counterfeiters, but the reality is, if a work-alike device can masquerade as a USB controller, it can do other evil things if someone wanted to. Old-fashioned serial and parallel ports had to be polled but starting with USB and now Thunderbolt, it’s a different ballgame.


17 posted on 01/08/2015 8:31:12 PM PST by bigbob (The best way to get a bad law repealed is to enforce it strictly. Abraham Lincoln)
[ Post Reply | Private Reply | To 4 | View Replies]

To: bigbob
> ...starting with USB and now Thunderbolt, it’s a different ballgame

You, Sir, said a mouthful with that. I've seen with my own eyes what an infected USB Flash drive can do, instantly and silently; fortunately it was plugged into the company's air-gapped "Quarantine Machine" because it was of unknown provenance. And right we were. The anti-virus on the QM picked up an attempt to write to the boot sector of the hard drive.

18 posted on 01/08/2015 8:43:58 PM PST by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Swordmaker

https://www.youtube.com/watch?v=v2AC41dglnM


19 posted on 01/08/2015 8:46:19 PM PST by BipolarBob
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Correct me if am wrong ... Are we looking at chinese production lines, thereby any cpu manufactured in china is suspect or eventually will be suspect once wild becomes embedded or technically before embedded occurs? Think know the answer and would answer yes ... thereby Mac is screwed, as are all the Sallys (all cpu’s) out there. Too bad we moved our manufacture base outside. Another sideline for those wishing us harm. Matter of time, exponentially.


20 posted on 01/08/2015 9:06:11 PM PST by no-to-illegals (Scrutinize our government and Secure the Blessing of Freedom and Justice)
[ Post Reply | Private Reply | To 6 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-46 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson