August 7, 2015 By Douglas Bonderud 2 min read

It’s common wisdom: Mac security is inherently superior to that of Windows and other PC operating systems. Many users credited Apple’s tightly controlled application and development environment for this improved protection, but in recent years security researchers have suggested a storm of malicious attacks may be on the horizon. Now, a pair of Mac security threats — Thunderstrike 2 and a new zero-day privilege exploit — have darkened user skies. Is this the end of Apple’s vaunted security superiority?

The Sound and the Fury

According to Threatpost, researchers have developed a remote-infection variant of firmware exploit bootkit Thunderstrike. Called Thunderstrike 2, the new vulnerability leverages much of the original kit to deliver malware capable of infecting both host machines and any connected accessories.

As noted by The Hacker News, Thunderstrike was first developed by security engineer Trammell Hudson, who discovered a flaw in Thunderbolt Option ROM that allowed the infection of any Apple Extensible Firmware Interface (EFI) by placing malicious code into boot ROM, making it almost impossible to remove. Thunderstrike had one limitation, however: Attackers needed physical access to victim machines.

Thunderstrike 2, meanwhile, has no such restrictions. The brainchild of Hudson and another security engineer, Xeno Kovah, it’s possible to spread Thunderbolt 2 via email, malicious websites or peripheral devices. Using a local root privilege exploit, the malware loads a kernel module to gain raw memory access and then either unlocks and rewrites the firmware or waits for the Mac to sleep and wake up again to alter its firmware. In both cases, removing the infection is almost impossible.

Thunderstrike and its progeny speak to one critical fallacy of Mac security: singularity. With other companies all leveraging virtually identical firmware, the software advantage granted by Mac OS X is rendered meaningless.

Zero-Day Strikes on Mac Security

Speaking of OS X, researchers have also discovered a flaw in the latest version of Yosemite that could allow malicious actors to gain root-level permissions without the need for administrator passwords. As noted by SecurityWeek, the issue lies with a hidden UNIX file named “sudoers,” which contains a list of software programs granted root access. When used alongside the DYLD_PRINT_TO_FILE vulnerability, which allows error logging to arbitrary files, it’s possible for cybercriminals to “open or create arbitrary files owned by the root user anywhere in the file system,” according to German security researcher Stefan Esser, who published the zero-day exploit details in July.

Attacks observed in the wild saw malicious actors running an installer that infected systems with VSearch adware, Genieo adware and in some cases the MacKeeper software. Both OS X 10.10.4 and beta 10.10.5 are vulnerable, while the new OS X 10.11 “El Capitan” beta appears to be immune.

After years of clear skies and starry nights, a storm is rolling in for Mac users. Serious firmware and software flaws have been discovered — and both are hard to detect and even harder to remove. For Mac users, there’s a simple lesson in the thunder and lightning: Standing under the Apple tree isn’t safe. Instead, it’s time to hunker down and start taking Mac security seriously.

More from

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today