Pages: [1]   Go Down
  Print  
Author Topic: Thunderbolt devices can infect MacBooks with persistent rootkits  (Read 399 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: December 24, 2014, 09:00:18 am »

Thunderbolt devices can infect MacBooks with persistent rootkits

<article>
   <section class="page">
<p>
Attackers can infect MacBook computers with highly persistent boot rootkits by connecting malicious devices to them over the Thunderbolt interface.</p><p>
The attack, dubbed Thunderstrike, installs malicious code in a MacBook’s boot ROM (read-only memory), which is stored in a chip on the motherboard. It was devised by a security researcher named Trammell Hudson based on a two-year old vulnerability and will be demonstrated next week at the 31st Chaos Communication Congress in Hamburg.</p><p>
“It is possible to use a Thunderbolt Option ROM to circumvent the cryptographic signature checks in Apple’s EFI firmware update routines,” Hudson said in the description of his upcoming presentation. “This allows an attacker with physical access to the machine to write untrusted code to the SPI flash ROM on the motherboard and creates a new class of firmware bootkits for the MacBook systems.”</p><p class="jumpTag"><a href="/article/2862872/thunderbolt-devices-can-infect-macbooks-with-persistent-rootkits.html#jump">To read this article in full or to leave a comment, please click here[/url]</p></section></article>

Source: Thunderbolt devices can infect MacBooks with persistent rootkits
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: