Categories: Hacking

Thunderstrike hack – Infecting Apple Mac with EFI Bootkit

A security researcher has presented a technique dubbed Thunderstrike hack to infect Apple’s Mac PCs with with EFI Bootkit through the Thunderbolt port.

Infect Apple Mac PCs exploiting the Thunderbolt port is possible, the security researcher Trammell Hudson has demonstrated how it is possible during  the last edition of the annual Chaos Computer Congress in Hamburg, Germany.

The researcher has demonstrated that it is possible to exploit the port by rewriting the firmware of an Intel Thunderbolt Mac. The hack, called Thunderstrike, exploit a well-known vulnerability in the Thunderbolt Option ROM that was first disclosed in 2012, but that still affects Apple Mac systems. Thunderstrike can infect the Apple

The Thunderstrike hack allows the attacker to infect the Apple Extensible Firmware Interface (EFI) by injecting the malware into the boot ROM of the targeted machine through infected Thunderbolt devices.

The Thunderstrike attack is very insidious because victims have no way to detect it, as explained by Trammell Hudson, even if the user completely re-install the OS X the machine will be still infected because the malicious code resides in the system’s own independent ROM.

“How bad could a weaponized version of the Thunderstrike bootkit be? Since it is the first OS X firmware bootkit, there is nothing currently scanning for its presence. It controls the system from the very first instruction, which allows it to log keystrokes, including disk encryption keys, place backdoors into the OS X kernel and bypass firmware passwords. It can’t be removed by software since it controls the signing keys and update routines. Reinstallation of OS X won’t remove it. Replacing the SSD won’t remove it since there is nothing stored on the drive.” states the official post on the Thunderstrike hack.

Hudson also showed that he is also able to replace Apple’s own cryptographic key with a new one, in this way the attacker can maintain a persistent control on the system by avoiding that legitimate firmware updates from being accepted.

There are neither hardware nor software cryptographic checks at boot time of firmware validity, so once the malicious code has been flashed to the ROM, it controls the system from the very first instruction,” Trammell Hudson said. “It could use SMM and other techniques to hide from attempts to detect it.

During its presentation, the expert also explained a technique to allow the bootkit to replicate itself to any connected Thunderbolt device. This infection method makes possible the diffusion of the malicious agent even if the attack targets an air-gapped network.

In addition to writing a custom code to the boot ROM, Hudson’s presentation also notes a method by which the bootkit could replicate itself to any attached Thunderbolt device, giving it the ability to spread across even air-gapped networks.

It is important to highlight that in order to exploit the Thunderstrike hack an attacker must have physical access to the targeted machine.

Apple has already patched part of the vulnerability in the latest Mac mini and on the iMac with 5K Retina Display, the company will soon provide the fix for the remaining products.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs –  Thunderstrike hack, hacking)

[adrotate banner=”12″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

4 hours ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

16 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

19 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

1 day ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

1 day ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.