Stay in the Loop

We are thrilled to extend a warm welcome to you as a valuable member of our vibrant crypto community! Whether you're an experienced trader, a crypto enthusiast, or someone who's just getting started on their digital currency journey, we're excited to have you onboard.

Read & Get Inspired

We're delighted to have you here and embark on this exciting journey into the world of Wikibusiness. Whether you're a newcomer or a seasoned explorer in this realm, we're dedicated to making your experience extraordinary. Our website is your gateway to a treasure trove of knowledge, resources, and opportunities.

PrimeHomeDeco

At PrimeHomeDeco, we believe that your home should be a reflection of your style and personality. Our upcoming website is dedicated to bringing you a curated selection of exquisite home decor that will transform your living spaces into elegant sanctuaries. Whether you're looking to revamp your living room, add a touch of sophistication to your bedroom, or create a cozy and inviting ambiance in your dining area, we have just the right pieces for you.

T2 security chip on Macs can be hacked to plant malware; cannot be patched – 9to5Mac

Security researchers have confirmed speculation that the T2 security chip on modern Macs can be hacked. A combination of two different exploits would give a hacker the ability to modify the behavior of the chip, and even plant malware like a keylogger inside it.

All Macs sold since 2018 contain the T2 chip, and because the attack uses code in the read-only memory section of the chip, there is no way for Apple to patch it …

How the T2 security chip exploit works

ZDNet reports that the attack involves using two exploits used to jailbreak iPhones. The reason they can also be used on Macs is because the T2 security chip is based on the A10 chip used in older iPhones.

The attack requires combining two other exploits that were initially used for jailbreaking iOS devices — namely Checkm8 and Blackbird. This works because of some shared hardware and software features between T2 chips and iPhones and their underlying hardware.

According to a post from Belgian security firm ironPeak, jailbreaking a T2 security chip involves connecting to a Mac/MacBook via USB-C and running version 0.11.0 of the Checkra1n jailbreaking software during the Mac’s boot-up process.

Per ironPeak, this works because “Apple left a debugging interface open in the T2 security chip shipping to customers, allowing anyone to enter Device Firmware Update (DFU) mode without authentication.”

“Using this method, it is possible to create an USB-C cable that can automatically exploit your macOS device on boot,” ironPeak said.

This allows an attacker to get root access on the T2 chip and modify and take control of anything running on the targeted device, even recovering encrypted data […]

The danger regarding this new jailbreaking technique is pretty obvious. Any Mac or MacBook left unattended can be hacked by someone who can connect a USB-C cable, reboot the device, and then run Checkra1n 0.11.0.

The ironPeak blog post summarizes the position in stark terms.

TL;DR: all recent macOS devices are no longer safe to use if left alone, even if you have them powered down.

  • The root of trust on macOS is inherently broken
  • They can bruteforce your FileVault2 volume password
  • They can alter your macOS installation
  • They can load arbitrary kernel extensions

It says the firm decided to go public because Apple failed to respond, despite being contacted ‘on numerous occasions.’

The risk to ordinary users is very low

The good news is that this exploit would require physical access to your Mac. Ensuring that your Mac is never left unattended where someone could gain access is the best protection. As always, you should also never connect anything to your Mac – from a charging cable upwards – unless you trust the person or organization providing it.

Since the attack requires physical access, ideally more than once (for example, once to install a keylogger to obtain your password, and again to use the password to access your data), it is the sort of attack which is most likely to be employed by state actors and corporate espionage agents against worthwhile targets: senior company execs, diplomats and so on. The risk to the average Mac user is very low.

The blog post speculates that Apple will likely create a new revision of the T2 chip based on the A12 for Apple Silicon Macs, so these will almost certainly be safe from the exploit.

We got an interesting look at all the jobs performed by the T2 chip back in 2018, and an Apple security document described the benefits of the chip.

FTC: We use income earning auto affiliate links. More.


Check out 9to5Mac on YouTube for more Apple news:

Related articles

Impulsive Method For Men – New Conversion Monster

Product Name: Impulsive Method For Men - New Conversion Monster Click here to get Impulsive Method For Men - New Conversion Monster at discounted price while it's still available... All orders are protected by SSL encryption...

Learn to Play The Piano Properly

Product Name: Learn to Play The Piano Properly Click here to get Learn to Play The Piano Properly at discounted price while it's still available... All orders are protected by SSL encryption – the highest industry...

DMX – Favor Explained: Faith, Redemption, and a Powerful Message

DMX – “Favor”: A Powerful Testament of Faith, Struggle, and Redemption “Favor” stands as one of the most spiritually charged and emotionally resonant songs in DMX’s catalog. Featuring Killer Mike, gospel duo Mary Mary, and...

Guide To Creating Spa Products & Soaps [HIGH Converting Craft Niche]

Product Name: Guide To Creating Spa Products & Soaps Click here to get Guide To Creating Spa Products & Soaps at discounted price while it's still available... All orders are protected by SSL encryption...

From K’un-Lun to New York: The Rise of Iron Fist

Iron Fist: The Return of Danny Rand to New York Iron Fist tells the story of Danny Rand, a man presumed dead for fifteen years after a tragic airplane crash in the Himalayas, who unexpectedly...
[mwai_chat model="gpt-4"]