One of the things that set Macs apart from most other computers is the Thunderbolt port. It can be used for displays, networking, storage among other things both individually or at the same time. It’s very versatile. Sadly, it seems it can be used for one other purpose. Someone could use a modified Thunderbolt device to take over your MacBook:
The attack, dubbed Thunderstrike, installs malicious code in a MacBook’s boot ROM (read-only memory), which is stored in a chip on the motherboard. It was devised by a security researcher named Trammell Hudson based on a two-year old vulnerability and will be demonstrated next week at the 31st Chaos Communication Congress in Hamburg.
“It is possible to use a Thunderbolt Option ROM to circumvent the cryptographic signature checks in Apple’s EFI firmware update routines,” Hudson said in the description of his upcoming presentation. “This allows an attacker with physical access to the machine to write untrusted code to the SPI flash ROM on the motherboard and creates a new class of firmware bootkits for the MacBook systems.”
Malicious code installed in the MacBook boot ROM will be executed before the OS is loaded, meaning it can patch the OS kernel and have complete control over the system. It also means that reinstalling Mac OS X will not remove the bootkit and neither will replacing the hard disk drive, because the malicious code is not stored on it.
For this to work, the attacker either has to have physical access to your MacBook, or they could plant something in a Thunderbolt device. The latter is very sneaky. There’s one more thing:
The bootkit can even replace Apple’s cryptographic key stored in the ROM with one generated by the attacker, preventing any future legitimate firmware updates from Apple, the researcher said in a blog post.
Firmware updates are supposed to be signed, but the vulnerability exploited by this attack allows that mechanism to be bypassed.
That’s a massive problem. When this gets presented at the Chaos Communication Congress, Apple is going to have a fair amount of explaining to do. Hopefully, they are paying attention and quickly roll out fixes to protect their users.
The Interview To Be Streamed On Various Platforms [UPDATED]
Posted in Commentary with tags Sony on December 24, 2014 by itnerdSony Pictures has announced that The Interview will be on Google Play,YouTube Movies, Microsoft’s Xbox Video and its own website http://www.seetheinterview.com for $5.99. It should be available by the time you read this. Google also came out on their blog saying among other things this:
“we could not sit on the sidelines and allow a handful of people to determine the limits of free speech in another country (however silly the content might be).”
To recap, here’s how you can see The Interview:
Google Play: You can go to play.google.com to buy or rent it. Or you can watch it in the Play Movies & TV app on Android and iOS phones or tablets, or streamed via Chromecast, Roku or the Nexus Player.
YouTube: Surf to youtube.com/movies or use the YouTube app, Chromecast, Apple TV, PlayStation and Xbox.
Microsoft’s Xbox Video: Buy or rent the movie using the Xbox Video app on Xbox One, Xbox 360, Windows 8, Windows Phone 8 and XboxVideo.com.
SeetheInterview.com: If none of that is an option, it is available http://www.seetheinterview.com, which is sponsored by Sony Pictures and powered by Kernel and with payments through Stripe, a secure payment platform.
You can also see it in select theaters tomorrow.
I guess it is clear now that those hackers known as “The Guardians Of Peace” did an outstanding job of shutting this movie down. Now more people than ever will see this film.
UPDATE: This appears to be US only. At least for the time being. Ditto for seeing The Interview in Canadian movie theaters.
Leave a comment »