Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: grandpa jones; dayglored
this is bad, right?

In a way, yes. . . however, I just went over the video and the article with a fine-tooth comb and I found this:

"Thunderstrike 2 starts with a local root privilege exploit that can load a kernel module to give it access to raw memory [and] can unlock and rewrite the motherboard boot flash," Hudson says.

They don't tell us right out that the Trojan that's required to invade the original "infection" machine has to be running with ROOT privileges. No normal Mac user ever runs with ROOT priveleges. . . not even an Administrator runs with ROOT privileges. That ROOT user is one level above Administrator. . . and is inactive on a normal Mac. The Administrator can reach ROOT commands by use of the SUDO command (SuperUser DO) for single command lines. Or an Administrator can activate a SuperUser by creating a ROOT account—only one is permitted per machine—by creating a Root user Name and password. Then logging in as that ROOT user.

The likelihood of anyone downloading a TROJAN as a ROOT user are somewhere between zero and nil. . . unless the user is industrial strength stupid and then some.

7 posted on 08/03/2015 11:06:04 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 6 | View Replies ]


To: Swordmaker
starts with a local root privilege exploit

Using a root privilege exploit means that the victim is running at normal priveleges. The exploit bumps the software up to the root level. The vcitim is not running at root, as you say, nobody does. But it's not impossible to find exploits to get from normal privileges to root, it just adds one more complication to the attack and one more chance for it to fail...

8 posted on 08/04/2015 3:03:41 AM PDT by palmer (Net "neutrality" = Obama turning the internet into FlixNet)
[ Post Reply | Private Reply | To 7 | View Replies ]

To: Swordmaker
Here's an example of a privilege escalation bug:

A bug in the latest version of Apple's OS X gives attackers the ability to obtain unfettered root user privileges, a feat that makes it easier to surreptitiously infect Macs with rootkits and other types of persistent malware.

link: http://arstechnica.com/security/2015/07/bug-in-latest-version-of-os-x-gives-attackers-unfettered-root-privileges/

The privilege-escalation bug, which was reported ...

The article about thunderstrike is a little vague. It doesn't come out and say they used a privilege escalation exploit, but it implies that it does.

9 posted on 08/04/2015 3:11:43 AM PDT by palmer (Net "neutrality" = Obama turning the internet into FlixNet)
[ Post Reply | Private Reply | To 7 | View Replies ]

To: Swordmaker

Ten + years ago, updating a Notion Ink Adam tablet we would causally root our tablet then flash the ROM to allow us to get updates from a web site called Tablet Roms. We were unconcerned about malicious exploits because no one knew of them. How times changed.


13 posted on 08/04/2015 4:23:37 AM PDT by topspinr
[ Post Reply | Private Reply | To 7 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson