August 7, 2015 By Douglas Bonderud 2 min read

It’s common wisdom: Mac security is inherently superior to that of Windows and other PC operating systems. Many users credited Apple’s tightly controlled application and development environment for this improved protection, but in recent years security researchers have suggested a storm of malicious attacks may be on the horizon. Now, a pair of Mac security threats — Thunderstrike 2 and a new zero-day privilege exploit — have darkened user skies. Is this the end of Apple’s vaunted security superiority?

The Sound and the Fury

According to Threatpost, researchers have developed a remote-infection variant of firmware exploit bootkit Thunderstrike. Called Thunderstrike 2, the new vulnerability leverages much of the original kit to deliver malware capable of infecting both host machines and any connected accessories.

As noted by The Hacker News, Thunderstrike was first developed by security engineer Trammell Hudson, who discovered a flaw in Thunderbolt Option ROM that allowed the infection of any Apple Extensible Firmware Interface (EFI) by placing malicious code into boot ROM, making it almost impossible to remove. Thunderstrike had one limitation, however: Attackers needed physical access to victim machines.

Thunderstrike 2, meanwhile, has no such restrictions. The brainchild of Hudson and another security engineer, Xeno Kovah, it’s possible to spread Thunderbolt 2 via email, malicious websites or peripheral devices. Using a local root privilege exploit, the malware loads a kernel module to gain raw memory access and then either unlocks and rewrites the firmware or waits for the Mac to sleep and wake up again to alter its firmware. In both cases, removing the infection is almost impossible.

Thunderstrike and its progeny speak to one critical fallacy of Mac security: singularity. With other companies all leveraging virtually identical firmware, the software advantage granted by Mac OS X is rendered meaningless.

Zero-Day Strikes on Mac Security

Speaking of OS X, researchers have also discovered a flaw in the latest version of Yosemite that could allow malicious actors to gain root-level permissions without the need for administrator passwords. As noted by SecurityWeek, the issue lies with a hidden UNIX file named “sudoers,” which contains a list of software programs granted root access. When used alongside the DYLD_PRINT_TO_FILE vulnerability, which allows error logging to arbitrary files, it’s possible for cybercriminals to “open or create arbitrary files owned by the root user anywhere in the file system,” according to German security researcher Stefan Esser, who published the zero-day exploit details in July.

Attacks observed in the wild saw malicious actors running an installer that infected systems with VSearch adware, Genieo adware and in some cases the MacKeeper software. Both OS X 10.10.4 and beta 10.10.5 are vulnerable, while the new OS X 10.11 “El Capitan” beta appears to be immune.

After years of clear skies and starry nights, a storm is rolling in for Mac users. Serious firmware and software flaws have been discovered — and both are hard to detect and even harder to remove. For Mac users, there’s a simple lesson in the thunder and lightning: Standing under the Apple tree isn’t safe. Instead, it’s time to hunker down and start taking Mac security seriously.

More from

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today