sexta-feira, 9 de janeiro de 2015

New Apple Malware is Undetectable, Unstoppable and Can Infect Any Thunderbolt-Equipped Device

Apple Products Have Long Enjoyed a Reputation for Superior Security in Relation to Windows Systems but, a New Proof-of-Concept Malware Delivery Method could Put a Serious Dent in that Reputation. The Exploit Dubbed, 'Thunderstrike', currently Can’t be Detected or Removed by any Known Process without Using Specialized Hardware. Security Researcher, Trammell Hudson, has Demonstrated How to Use a Thunderbolt Peripheral to Load What he’s Calling a “Bootkit” via the Device’s Option ROM. Option ROMs are Optional or Peripheral-Specific Blocks of Memory that, were 1st Deployed in the 1980s as a Way of Storing Critical Programs or Retrieving Peripheral-Specific Blocks of Memory. They’re Initialized Early in the Boot Process and Often “Hook” to the BIOS to Provide a Bootable Device or Network Boot. Thunderbolt Devices Contain their Own Option ROMs and Apple Hardware Checks these Areas as Part of its Boot Sequence. The Exploit Package is Injected from the Infected Thunderbolt Device’s Option ROM, Directly into the System’s Extensible Firmware Interface (EFI). Official Documentation on the EFI / UEFI Standard, Seems to Imply that, this is Impossible, since the Firmware is Supposed to be Locked by Default. Unfortunately, it Isn’t.





Hudson’s Research and Testing Indicates that, the Option ROMs are Loaded during the Recovery Mode Boot Process. The One Snag, at this Point, is that, Apple still Checks the Signature of the EFI File itself. Change the File Size or Contents and it Fails the Check — or it Would, if the Research Team Hadn’t Devised a Method of Replacing Apple’s Stored Public RSA Key with a Key under their Own Control. Once this Step is Taken, there’s No Going Back. Without a Proper RSA Authentication Key, it’s Impossible for the End User to Update the Device’s Firmware with a Standard Apple Image. All Attempts to do so, will Fail Authentication. With such Basic Access to the System, there’s Very Little an Attacker Can’t do. The Entire System Can be Monitored, Keystrokes Logged, Website Visits Tracked, Password Data Recorded. The Bootkit Can also be Passed to Other Thunderbolt Devices if, they’re Connected to a Compromised Machine. Are “Evil Maid” Attacks a Valid Vector ? The One Slice of Good News in this Issue is that, the Attack does Require at least a Brief Window of Physical Access to the System. In Most Cases, that Kind of Requirement Confines Most Attacks to Strictly Theoretical Exercises but, Thunderstrike is Somewhat Different. First, the Attack is Fast. The Attacker Doesn’t Need to Sit Down at the PC for Several Minutes, or Even Enter Data.





Surreptitiously Plug in a Thunderbolt Device, Hold Down the Power Button for Several Seconds and Boom — the Attack Can Execute and Self-iInstall in a Scant Number of Minutes. Depending on How Sneaky the Execution is, a Casual Observer might See Nothing but a Longer-than-Normal Boot Cycle. The Standard Model for Physical-Access Attacks, Relies on the Idea of the Evil Maid — Someone Who Can Access a System while it’s Stored in a Hotel Room or Locked in a Safe but, I Daresay the Speed and Subtlety of this Hack, Make it a Larger Threat. If you’ve Ever Attended a Business Conference or Tech Event, it’s Not Exactly Rare for People to Have Laptops Out but, Not Strictly Attended to, or to Leave a System Sit for a Few Minutes while they Use the Restroom or Grab a Soda. Third and Most Chillingly, we Now Know that, Government Agencies Actively Engage in the Kind of Targeted Intercept that Makes an Attack like this Work. One of the Reports Leaked by Edward Snowden, Detailed How the NSA will Intercept Hardware en Route from Manufacturers like Dell and HP, Modify it with Rootkits and Spyware before it Reaches its Destination, then Repackage the Equipment and Ship it on its Way. While there’s No Way of Knowing just How Widespread such Tactics are, we Know it Happens — Exploits like 'Thunderstrike' are Likely Worth their Weight in Gold to the Various National Intelligence Agencies of the World. Apple is Preparing a Firmware Patch that will at least Refuse to Load Option ROMs during Firmware Updates but, it Leaves Open a Different Security Exploit First Detected in 2012. The Timeline for a Complete Fix is Unknown.




0 comentários:

Enviar um comentário