08-04-2015, 01:52 PM
So the vast majority of Mac owners who use nothing more than USB for peripherals will never have to worry about this exploit?
The only cure for new Apple malware is to trash your Mac
|
08-04-2015, 01:52 PM
So the vast majority of Mac owners who use nothing more than USB for peripherals will never have to worry about this exploit?
08-04-2015, 01:55 PM
Bill in NC wrote: Yup.
08-04-2015, 02:07 PM
Glad my macs don't have Thunderbolt!
![]()
08-04-2015, 02:59 PM
modelamac wrote: Those aren't space-time's words, that's the title directly from the article, as well as the quoted text that says to throw away the your hard drive.
08-04-2015, 04:23 PM
There was a similar exploit I remember reading about some time ago for USB. Some sketchy companies could potentially inject malware into their USB devices from the factory, or reflash ones with that capability...
08-04-2015, 05:14 PM
fauch wrote: Once upon a time even Apple shipped iPods with malware on them. It can happen because the supply chains are a lot more complex than we think.
08-04-2015, 05:21 PM
Bill in NC wrote: It infects the EFI, can be remotely spread, and by the description, used Thunderbolt to replicate, not infect. "Attackers might choose to infect a target via a phishing email and malicious site. The malware could “spread automatically from MacBook to MacBook, without the need for them to be networked.” Attackers could remotely target computers, even air-gapped ones, with Thunderstrike 2 as it is designed to spread by infecting the option ROM on peripheral devices. The proof-of-concept malware would “be on the lookout for any peripherals connected to the computer that contain option ROM, such as an Apple Thunderbolt Ethernet adapter, and infect the firmware on those,” explained Wired. “The worm would then spread to any other computer to which the adapter gets connected.” These flaws don't require physical access; however, since the attack can propagate over Thunderbolt, air gapped systems are not safe. Plenty of people share adapters and other accessories.
08-04-2015, 05:21 PM
rjmacs wrote: The attacks don't require Thunderbolt, just an EFI, or I'm totally misreading the two articles provided.
08-04-2015, 05:22 PM
Mr645 wrote: Incorrect according to the security researchers. "Attackers might choose to infect a target via a phishing email and malicious site. The malware could “spread automatically from MacBook to MacBook, without the need for them to be networked.” Attackers could remotely target computers, even air-gapped ones, with Thunderstrike 2 as it is designed to spread by infecting the option ROM on peripheral devices. The proof-of-concept malware would “be on the lookout for any peripherals connected to the computer that contain option ROM, such as an Apple Thunderbolt Ethernet adapter, and infect the firmware on those,” explained Wired. “The worm would then spread to any other computer to which the adapter gets connected.”"
08-04-2015, 05:22 PM
jdc wrote: Yup. No. It's an EFI hack that can be remotely executed, as the articles describe things anyway, clearly I'm not a member of the research team. |
« Next Oldest | Next Newest »
|