Posted on 06/02/2015 9:34:18 PM PDT by Swordmaker
BurnIconXA new exploit dubbed Dark Jedi exists for MacBook systems created before mid-2014, where a hacker can issue a malicious program to overtake the systems firmware by simply having the system be put in sleep mode. Upon waking from sleep, the firmware on these older Macs is unlocked, which leaves them open to access and modification from applications running in OS X. This contrasts with the recent Thunderstrike firmware vulnerability that allowed hackers to overtake firmware, but required physical access to the system. Since this current vulnerability is run by way of malicious software, systems can be attacked remotely by uses of trojan horse and other social engineering approaches, but this also provides an avenue for protection.
If your Mac is an older one and you are concerned about this vulnerability, keep in mind that for now this is a proof-of-concept attack that is not known to be in any active hacking attempts. In addition it has three key limitations:
These mean that to be compromised, you will have to specifically download the installer from a malicious site, and then purposefully open it and then supply your administrative password when prompted. As such, there are several approaches for avoiding these requirements and keeping your system safe:
Only download software from developer sites or reputable software distributors
If you see a notice about a software update required for your system, then consider closing it and going to an official and known source for obtaining the latest version of that software package. For instance, if you are notified about an Adobe Flash or Java update, then go to the corresponding system preferences pane and use the update features in there, or go to Adobes Oracles, or any other relevant developers Web site to download standalone installers. For other software, use similar built-in software updaters and services like Apples Mac App Store for getting updates.
Judging potentially malicious sites can sometimes be difficult, but legitimate developers will usually channel you directly to appropriate and desired updater, whereas malicious sites often show many popups (some of which may download unwanted installers to your system), numerous ads, free deals and other offers, and redirect you to sites you did not intend. If any of these occur when browsing the Web, close them down and avoid interacting with them.
Be cautious about any package or installer you run on your Mac
Whenever you are asked for your password, OS X system is attempting to escalate privileges to modify system resources. Therefore, if you see any notice on your Mac that asks you to enter your password, then be wary of it.
By only supplying your password when you need to specifically modify a setting, or are running a software installer that you trust and know the source of, then you will almost guarantee that you will avoid malware packages such as this one. If you even slightly suspect a package or installer, then delete it from your system and re-download it from the developers site.
Dont allow your Mac to go to sleep
Even though this aspect of the Dark Jedi hack requires you have already installed the malicious software, this particular hack exploits the vulnerability where the firmware is left unlocked during sleep mode. This means that for now its mode of attack is when your Mac goes to sleep. While sleep mode is great for quick and convenient resuming of your workflow, OS X implements autosave and resume for resuming your workflow when your Mac boots. Therefore, in many cases you can similarly pick up where you left off by shutting your Mac down instead of sleeping it. To prevent system sleep, check the option to do so for each power profile in the Energy Saver system preferences pane.
Macs are by default, never in Root Access unless the Administrator User actually activates Root and gives it a Root Access password. 99.99% of all Macs do not run with Root Access activated!
This makes this Proof-of-Concept vulnerability almost impossible to exploit as it requires a double user privilege escalation from standard user (You ARE funning as a standard user, aren't you?), to Admin user to Root user before the Firmware can be modified.
If you want on or off the Mac Ping List, Freepmail me.
I challenge the members of the Apple ping list to each donate at least $10 each to the latest Freepathon. I HAVE donated $100. Many members of the Apple Ping list are already rising to the challenge. Join them. Let's show the power of the Apple Ping list in supporting Freerepublic!
"You ARE funning as a standard user, aren't you?" = "You ARE running as a standard user, aren't you?"
How do you know if you are running as root user or standard user?
> How do you know if you are running as root user or standard user?
Open System Preferences, then User Accounts, then find your user name in the list of accounts. It should tell you if your account is Admin or Standard. If it’s Standard then you are not root, and can’t be even if you try.
If it’s Admin, then you can become root if you request it. To tell if you are root, open Terminal (in Applications, Utilities) and type the command:
whoami
Then the Return key. It will print your username.
Thanks
exists for MacBook systems created before mid-2014Does this mean that my old iMac, which my daughter commandeered but isn't using, would NOT be vulnerable (even if it were powered up and in use?).
Are we still waiting for Apple to patch something before we reactivate Java? I'm using Firefox to avoid Safari with/out java, and I'm not preferring it . . .
No OS X Mac runs as a Root user. . . that has to be activated and then even then you don't run in root. From OS X, Root is a one time command user that is used by the Terminal. If you are running your Mac by UNIX command line, you can be a permanent Root User, but that is so rare, only real Geeks might do it. . . and then they generally are not going to put their Macs to sleep.
Most Mac users are going to be either an Administrator user (default out-of-the-box user), or Standard user for those who know how to be safe computer user).
You should be running as a Standard user with a second user in reserve as the Administrator for installing software and doing system routines.
To find out what kind of user you are running as, go to the Black Apple Menu and select System Preferences. . . /Users and Groups and see if you are running as Standard or Admin.
If you are running as Admin, create a new user by following these steps:
You will notice your user name is now on the menu bar just to the left of the Spotlight search icon and if you click on it, you can switch users rapidly to the Administrator Account (you'll have to enter the admin password) to do any housekeeping or install software. If you want to download or install software, the system will prompt you, as a standard user, to enter the admin's user name and password. You will not have to switch to the admin account to do it, but you will have to know the admin name and password to do it.
If you log onto your administrator account for any reason, ALWAYS log off when you are done. NEVER LEAVE IT RUNNING!
This is the safest way to use your Mac computer.
To activate Root, a user MUST be running as an Administrator and then open the Terminal and then deliberately activate Root and give it a Root user name and root user password.
Apple discontinued doing the updates for JAVA and instead lets Oracle handle the updates. You can turn JAVA back on if you have any need for it, but make sure you update it to the latest OS X version from Oracle. Most people don't really need Java and it merely opens them to several Trojans that they REALLY don't want.
JAVA Script is entirely different. . . but I find I really don't need that either.
The vulnerability is in the EFI firmware—which is exclusive to AMD64 computers—Intel-based Macs.
If the iMac is PowerPC-based, then you are safe (but a bit dated).
Core2 duo, as I recall . . . I upgraded the RAM to the max of 4G a good while ago.
I think yours goes up to 64GB of total memory...also, since we're already at that point, I think you should check your security settings, as described in the article.
The 4GB limit is a relic of the original i386 micro-architecture; even modern 32-bit processors (since the Pentium Pro) could address more than 4GB of RAM using something called Physical Address Extension, to 36 bits.
Whoops, I think the actual limit, for your particular iMac, is actually 32GB....if you look up your exact iMac model online, it should tell you—but it is definitely more than 4GB...
Thanks for info.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.