Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Of all the alleged Mac "hacks" that have surfaced over the years, this is the only one that has seemed to be a legitimate concern to me. The other hacks usually required direct access to your computer or installing some shady torrent software after putting in an admin password. This thing can be remotely installed from a website and can't be wiped. Sure, don't visit a shady website you say. But if a web server is compromised in some other way and this hack is installed, you could get it from nearly anywhere. This is bad.

CKI9X5nWEAAyXGG.jpg


Whoever wanted to download that and open a terminal? The user is the main problem here. Enough said.
 
Is there a list of Macs known to be susceptible to this, or is it all of them? I was looking at (eventually) getting a new iMac, but now not so sure.

And before any fanboys share their "0.2" - I take security very seriously, and while I love Apple, I'm not going to invest in such an expensive machine with doors like this wide open.
 
Just to translate to plain english:
"Thunderstrike 2, unlike the first demonstration of Thunderstrike, is able to infect a Mac remotely through a malicious website or email."
Translation:
"You receive a link via email or web sites, download the malicious firmware, install it as root after entering administrator password"
It's not something that happens alone. It's like complaining someone robbed your house and it turns out you gave them the keys.
 
it's crazy that someone has this kind of time on their hands. I'd love to hire them to work on my latest App design but they are busy hacking away at the mac.
Agreed. However the way I see it, this is a double-edged sword. On the one hand these 'researchers' help Apple and the Mac community-at-large by pointing out vulnerabilities that can then be addressed, but they also highlight these weak spots to those malicious hackers that are ready to pounce during that limited window of opportunity, before patches are in place.

Apple for obvious reasons has seemed to be taking their time to respond to these various exploits. Most often these legitimate researchers contact Apple first, before publicly releasing their findings to give Apple time to address the problem, before the vulnerability is exposed for all to read.
 
Apple for obvious reasons has seemed to be taking their time to respond to these various exploits.


What obvious reasons? - I think it's pertinent to fix this ASAP. Any lallygagging around is pretty inexcusable. Apple responding to these threats as quick as possible can only lead to good things, or am I missing something?
 
I think the keyword here is "firmware". Just like the original Thunderstrike, it involves plugging in a rogue Thunderbolt cable or accessory. That's the freaking attack vector. So... if you don't plug anything that you don't trust, then you can't be compromised. Sure if you are willy-nilly plugging in an infected thunderbolt cable to multiple computers, it can infect them, yada yada... but the issue here is it has to start with infected hardware which a) doesn't exist in the wild b) would replicate very slowly.

Just saying... not dooms day stuff here... and Apple will fix it in less than a month.
 
Apple is so screwy that that don't know the meaning of security. It's ironic that cook and his friends believe security and privacy and yet are vulnerable to worm attack. Stop focusing on jailbreak and focus on overall security. People, don't forget what snow leopard..
 
What obvious reasons? - I think it's pertinent to fix this ASAP. Any lallygagging around is pretty inexcusable. Apple responding to these threats as quick as possible can only lead to good things, or am I missing something?
I hear what you're saying, they have a responsibility to act on this asap.

There is however a fine line between (A) immediately publicly acknowledging the problem and by such recognition focussing even more attention to the problem, and perhaps creating fear and uncertainty in the Mac community (while they are perhaps still struggling to determine the scope of the problem and while they are still in the process of developing a working and foolproof patch), and (B) quietly and diligently working to create a permanent solution to solve the exploit, as you can bet your bottom dollar they are.
 

There were some issues with the way that data was represented, read your own linked ZDNet article for more info.
 
"First Firmware Worm Able to Infect Macs Created by Researchers"

So these researchers created Macs? Poor grammar, you need to go back to school, Macrumors.
 
I think the keyword here is "firmware". Just like the original Thunderstrike, it involves plugging in a rogue Thunderbolt cable or accessory. That's the freaking attack vector. So... if you don't plug anything that you don't trust, then you can't be compromised. Sure if you are willy-nilly plugging in an infected thunderbolt cable to multiple computers, it can infect them, yada yada... but the issue here is it has to start with infected hardware which a) doesn't exist in the wild b) would replicate very slowly.
Maybe, maybe not. A guy walks up to a convenience charging station in the gate area at ATL. His MacBook (with one, universal port) is pre-infected (intentionally?) with this malware. It transfers to the Thunderbolt/USB-C at the charging station. Now every subsequent user of that charging station will be infected. The same could happen at libraries, A/V presentation situations ("oh you forgot your cable, here borrow this one..."), etc.

The only real fix is to trash all existing Thunderbolt peripherals and cables and replace them with updated, more secure versions. How likely is that?
 
Err, no it won't. We all know how rubbish Apple is when it comes to security so if you think El Capitan will make your Mac bulletproof then you need to get some help.
We all know how rubbish everyone is when it comes to security. XD
Seriously, there have been major breaches everywhere recently. Most of the Unix world fell victim to the Bash bug and those OpenSSL messes. Perhaps the only way Apple did worse was by not having an "apt-get" command in OS X to install individual patches. Ironically, the only big platform for which there hasn't been a egregious vulnerability exposed has been Microsoft Windows, but maybe it's because it's no longer news at this point if it happens.

I never used to suspect that the government was planting vulnerabilities, but there have been some ridiculous breaches discovered...
 
Of all the alleged Mac "hacks" that have surfaced over the years, this is the only one that has seemed to be a legitimate concern to me. The other hacks usually required direct access to your computer or installing some shady torrent software after putting in an admin password. This thing can be remotely installed from a website and can't be wiped. Sure, don't visit a shady website you say. But if a web server is compromised in some other way and this hack is installed, you could get it from nearly anywhere. This is bad.
Also all the Flash and Java vulnerabilities, but they're usually discovered before too many have fallen victim, so I never worry.
 
Correct me if I'm wrong, but this doesn't necessarily sound like a worm to me.
They didn't describe how this works really - they said that malicious code can be delivered via email or a website... And then what? It still needs to be run, does it not? It won't just automatically run itself, will it?
That means it's a Trojan, not a worm, right? The only precaution a user needs to take is not running code that they shouldn't trust, and by default since Mountain Lion, you can't run unsigned code because of Gatekeeper, right?

It's not exactly a Trojan, and it won't be blocked by Gatekeeper, since it's an attack in the hardware/firmware level.

Malicious firmware can only infect you machine during booting procedure, that is, even before the OS is loaded. You need to reboot your machine from infected storage device (such as an USB stick), so that the firmware can only be reprogrammed.

It's possible to spread the malicious codes through network connection, but the codes must be applied to a bootable media, before it become infectious. And of course, the attackers will need breach the victim system, pass Gatekeeper check, gain root access, before they can finally apply the codes to some media. But that's off-topic issues, for those researchers.

In short: the researchers "assumed" your system is already breached, AND the malicious codes is already applied to a bootable media, AND, for some mysterious reason, you choose to reboot from the infected media, so that your machine can finally get infected. Piece of cake, isn't it ?

However, you may still want to keep an eye on it. While normal users won't need to worry about it too much, you're still altered if you're an IT manager of schools or labs. The machines under your management could possibly being attacked, if the users are allowed to contact with the machines physically. Attackers could simply plug a USB stick, reboot, and BOOM! You're breached.

Well that's the whole story, sort of.
 
There is also the fact that Windows versions are listed separately, but Mac OS versions are not. Adding together all of Windows exploits gets you to 248 exploits, which is more than Apples.

Good observation. Not only that, but Windows XP was left out that accounts for roughly 20%. No Android listed?!? Considering they mentioned iOS.
 
  • Like
Reactions: dilap
At least with Windows 10 you know MS is snooping on everything by default. The whole OS is a trojan.
lol hey at least they are being honest.
Actually, Apple has already been infected by a worm.

It happened many years ago. It lay dormant, and bided its time, waiting for the right moment to begin its mission to turn Apple rotten. It's name is Tim.
What if every Mac is already infected with malware.
What if every Mac for the last decade has slowing and inconspicuously been infected by sleeper malware.
What if one day they all awake to become a massive super computer, everywhere and nowhere…

Transcendence.
 
Last edited:
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.