Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

How to protect your Mac from the ‘Dark Jedi’ firmware hack
Mac Issues ^ | June 2, 2015 | by Topher Kessler

Posted on 06/02/2015 9:34:18 PM PDT by Swordmaker

BurnIconXA new exploit dubbed ‘Dark Jedi’ exists for MacBook systems created before mid-2014, where a hacker can issue a malicious program to overtake the system’s firmware by simply having the system be put in sleep mode. Upon waking from sleep, the firmware on these older Macs is unlocked, which leaves them open to access and modification from applications running in OS X. This contrasts with the recent Thunderstrike firmware vulnerability that allowed hackers to overtake firmware, but required physical access to the system. Since this current vulnerability is run by way of malicious software, systems can be attacked remotely by uses of trojan horse and other social engineering approaches, but this also provides an avenue for protection.

If your Mac is an older one and you are concerned about this vulnerability, keep in mind that for now this is a proof-of-concept attack that is not known to be in any active hacking attempts. In addition it has three key limitations:

  1. It requires root access
  2. It requires you download it
  3. It requires your system be put to sleep

These mean that to be compromised, you will have to specifically download the installer from a malicious site, and then purposefully open it and then supply your administrative password when prompted. As such, there are several approaches for avoiding these requirements and keeping your system safe:

Only download software from developer sites or reputable software distributors

If you see a notice about a software update required for your system, then consider closing it and going to an official and known source for obtaining the latest version of that software package. For instance, if you are notified about an Adobe Flash or Java update, then go to the corresponding system preferences pane and use the update features in there, or go to Adobe’s Oracle’s, or any other relevant developer’s Web site to download standalone installers. For other software, use similar built-in software updaters and services like Apple’s Mac App Store for getting updates.

Judging potentially malicious sites can sometimes be difficult, but legitimate developers will usually channel you directly to appropriate and desired updater, whereas malicious sites often show many popups (some of which may download unwanted installers to your system), numerous ads, free deals and other offers, and redirect you to sites you did not intend. If any of these occur when browsing the Web, close them down and avoid interacting with them.

Be cautious about any package or installer you run on your Mac

Whenever you are asked for your password, OS X system is attempting to escalate privileges to modify system resources. Therefore, if you see any notice on your Mac that asks you to enter your password, then be wary of it.

By only supplying your password when you need to specifically modify a setting, or are running a software installer that you trust and know the source of, then you will almost guarantee that you will avoid malware packages such as this one. If you even slightly suspect a package or installer, then delete it from your system and re-download it from the developer’s site.

Don’t allow your Mac to go to sleep

Even though this aspect of the Dark Jedi hack requires you have already installed the malicious software, this particular hack exploits the vulnerability where the firmware is left unlocked during sleep mode. This means that for now its mode of attack is when your Mac goes to sleep. While sleep mode is great for quick and convenient resuming of your workflow, OS X implements autosave and resume for resuming your workflow when your Mac boots. Therefore, in many cases you can similarly pick up where you left off by shutting your Mac down instead of sleeping it. To prevent system sleep, check the option to do so for each power profile in the Energy Saver system preferences pane.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS:
Note that requirement #1 is the most important protection for OS X Mac users.

Macs are by default, never in Root Access unless the Administrator User actually activates Root and gives it a Root Access password. 99.99% of all Macs do not run with Root Access activated!

This makes this Proof-of-Concept vulnerability almost impossible to exploit as it requires a double user privilege escalation from standard user (You ARE funning as a standard user, aren't you?), to Admin user to Root user before the Firmware can be modified.

1 posted on 06/02/2015 9:34:18 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
The newly named "Dark Jedi" Firmware Hack, actually a vulnerability, is not as dangerous as some pundits might claim. 99.99% of all OS X Macs in the wild will not be at risk from this hack. It requires the Mac to have Root Access activated but OS X Macs are shipped without Root Access activated. For this vulnerability to be exploited, it requires the targeted Mac to experience two levels of privilege escalation from standard user to Admin user then to Root user, a very, very difficult thing to accomplish by a malicious application, in fact, something that has never been accomplished. Apple will most likely patch this vulnerability very quickly. It is already is fixed in all Macs post mid 2014. — PING!


Apple Security Ping!

If you want on or off the Mac Ping List, Freepmail me.

I challenge the members of the Apple ping list to each donate at least $10 each to the latest Freepathon. I HAVE donated $100. Many members of the Apple Ping list are already rising to the challenge. Join them. Let's show the power of the Apple Ping list in supporting Freerepublic!

If you have ordered an Apple Watch,
MAKE A DONATION TO THE FREEPATHON!

2 posted on 06/02/2015 9:42:17 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Damn auto correct. . .

"You ARE funning as a standard user, aren't you?" = "You ARE running as a standard user, aren't you?"

3 posted on 06/02/2015 9:43:35 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

How do you know if you are running as root user or standard user?


4 posted on 06/02/2015 10:52:45 PM PDT by ProtectOurFreedom (For those who understand, no explanation is needed. For those who do not, no explanation is possible)
[ Post Reply | Private Reply | To 3 | View Replies]

To: ProtectOurFreedom

> How do you know if you are running as root user or standard user?

Open System Preferences, then User Accounts, then find your user name in the list of accounts. It should tell you if your account is Admin or Standard. If it’s Standard then you are not root, and can’t be even if you try.

If it’s Admin, then you can become root if you request it. To tell if you are root, open Terminal (in Applications, Utilities) and type the command:

whoami

Then the Return key. It will print your username.


5 posted on 06/02/2015 11:58:33 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is...sounding pretty good about now.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: dayglored

Thanks


6 posted on 06/03/2015 4:08:39 AM PDT by ProtectOurFreedom (For those who understand, no explanation is needed. For those who do not, no explanation is possible)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Swordmaker
exists for MacBook systems created before mid-2014
Does this mean that my old iMac, which my daughter commandeered but isn't using, would NOT be vulnerable (even if it were powered up and in use?).
Are we still waiting for Apple to patch something before we reactivate Java? I'm using Firefox to avoid Safari with/out java, and I'm not preferring it . . .

7 posted on 06/03/2015 5:42:51 AM PDT by conservatism_IS_compassion ('Liberalism' is a conspiracy against the public by wire-service journalism.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ProtectOurFreedom
How do you know if you are running as root user or standard user?

No OS X Mac runs as a Root user. . . that has to be activated and then even then you don't run in root. From OS X, Root is a one time command user that is used by the Terminal. If you are running your Mac by UNIX™ command line, you can be a permanent Root User, but that is so rare, only real Geeks might do it. . . and then they generally are not going to put their Macs to sleep.

Most Mac users are going to be either an Administrator user (default out-of-the-box user), or Standard user for those who know how to be safe computer user).

You should be running as a Standard user with a second user in reserve as the Administrator for installing software and doing system routines.

To find out what kind of user you are running as, go to the Black Apple Menu and select System Preferences. . . /Users and Groups and see if you are running as Standard or Admin.

If you are running as Admin, create a new user by following these steps:

  1. Unlock the Users and Groups pane by clicking on the pad lock at the bottom left of the window. It may ask for your password.
  2. Create the NEW user by clicking on the PLUS (+) button on the bottom of the user box.
  3. Make that new user an Admin user by providing a name for the account you will remember (Freedom Admin), give it a hard password that you will NOT forget using both upper and lower case letters, numbers, and at least one keyboard symbol.
  4. Depending on the version of OS X, it may allow you to establish a short name for the account. Don't call it "admin" or anything a hacker can figure out. Use something you will know but can't be figured out by knowing you.
  5. When you have successfully created the new administrator account, change YOUR account to a Standard user from Administrator by either unchecking the "Allow this user to administer this computer" or changing the drop down menu selector from Administrator to Standard, depending on the Version of OS X. (You can still do everything from your standard account including install software, but you will have to invoke the admin account by entering the administrator's name and password to do it.).
  6. Make sure you know your password in your account, if not, change IT to something you won't forget using the same criteria above.
  7. click "Log in Options" at the bottom of the user list.
  8. Set automatic log in to off.
  9. Check the "Show Sleep, Restart, and Shut Down Buttons" Box.
  10. Check the "Show fast menu switching as:" Box.
  11. Set Fast Menu switching to: "Full name".
  12. Click the lock to re-lock the preference pane.
  13. Close the preference pane.
  14. Under the black Apple Menu, log out of your current standard user.
  15. Log onto the new Administrator account and provide your Apple ID and password to re-establish your computer's link to Apple. There is no need to import any data into this account. The less data here, the better.
  16. Log out of the Administrator Account.
  17. Log back into your personal, now standard account.

You will notice your user name is now on the menu bar just to the left of the Spotlight search icon and if you click on it, you can switch users rapidly to the Administrator Account (you'll have to enter the admin password) to do any housekeeping or install software. If you want to download or install software, the system will prompt you, as a standard user, to enter the admin's user name and password. You will not have to switch to the admin account to do it, but you will have to know the admin name and password to do it.

If you log onto your administrator account for any reason, ALWAYS log off when you are done. NEVER LEAVE IT RUNNING!

This is the safest way to use your Mac computer.

To activate Root, a user MUST be running as an Administrator and then open the Terminal and then deliberately activate Root and give it a Root user name and root user password.

8 posted on 06/03/2015 9:34:27 AM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 4 | View Replies]

To: conservatism_IS_compassion
Are we still waiting for Apple to patch something before we reactivate Java? I'm using Firefox to avoid Safari with/out java, and I'm not preferring it . . .

Apple discontinued doing the updates for JAVA and instead lets Oracle handle the updates. You can turn JAVA back on if you have any need for it, but make sure you update it to the latest OS X version from Oracle. Most people don't really need Java and it merely opens them to several Trojans that they REALLY don't want.

JAVA Script is entirely different. . . but I find I really don't need that either.

9 posted on 06/03/2015 9:38:23 AM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 7 | View Replies]

To: conservatism_IS_compassion

The vulnerability is in the EFI firmware—which is exclusive to AMD64 computers—Intel-based Macs.

If the iMac is PowerPC-based, then you are safe (but a bit dated).


10 posted on 06/03/2015 2:29:16 PM PDT by __rvx86 (Ted Cruz: Proving that conservative populism is a winning strategy. GO CRUZ!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: __rvx86
Core2 duo, as I recall . . . I upgraded the RAM to the max of 4G a good while ago.

11 posted on 06/03/2015 4:05:47 PM PDT by conservatism_IS_compassion ('Liberalism' is a conspiracy against the public by wire-service journalism.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: conservatism_IS_compassion
Unless the hardware (motherboard) or firmware specifically restricts it, there should not be any reason as to why your iMac could not address more memory. The Intel Core 2, like all the other processors used in Intel-based Macs, supports the AMD64 extensions.

I think yours goes up to 64GB of total memory...also, since we're already at that point, I think you should check your security settings, as described in the article.

The 4GB limit is a relic of the original i386 micro-architecture; even modern 32-bit processors (since the Pentium Pro) could address more than 4GB of RAM using something called Physical Address Extension, to 36 bits.

12 posted on 06/03/2015 4:38:00 PM PDT by __rvx86 (Ted Cruz: Proving that conservative populism is a winning strategy. GO CRUZ!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: conservatism_IS_compassion

Whoops, I think the actual limit, for your particular iMac, is actually 32GB....if you look up your exact iMac model online, it should tell you—but it is definitely more than 4GB...


13 posted on 06/03/2015 4:52:57 PM PDT by __rvx86 (Ted Cruz: Proving that conservative populism is a winning strategy. GO CRUZ!)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Swordmaker

Thanks for info.


14 posted on 06/03/2015 8:29:28 PM PDT by johngrace ( I am a 1 John 4! Christian- declared at every Sunday Mass , Divine Mercy and Rosary prayers!)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson