Macworld (USA)

Major security flaw found in Thunderbol­t Macs and PCS

A series of vulnerabil­ities in Thunderbol­t 2 and 3, collective­ly called ‘Thunderspy,’ can leave your Mac open to hacking.

- BY JASON CROSS

Security researcher Björn Ruytenberg with the Eindhoven University of Technology recently published a report ( go. macworld.com/bjry) detailing a series of serious security vulnerabil­ities in

Thunderbol­t 2 and Thunderbol­t 3, collective­ly called “Thunderspy.”

They affect every single computer with a Thunderbol­t 2 or Thunderbol­t 3 port, including old-style port connectors and new Type-c connectors, whether the

computers are running Windows, Linux, or macos. How badly does this security flaw impact Mac users? Should you freak out about someone hacking into your Macbook the next time you get up from your desk to refill your coffee?

SEVEN THUNDERSPY VULNERABIL­ITIES

Ruytenberg describes seven vulnerabil­ities in his paper ( go.macworld. com/7vln). They are as follows.

Inadequate firmware verificati­on schemes.

Weak device authentica­tion scheme. Use of unauthenti­cated device metadata.

Backwards compatibil­ity.

Use of unauthenti­cated controller configurat­ions.

SPI flash interface deficienci­es. No Thunderbol­t security on Boot Camp.

It’s beyond the scope of this article to get into exactly what each of these mean and how they can be exploited to breach systems with Thunderbol­t ports.

Just know this: Macs are only susceptibl­e to vulnerabil­ities 2 and 3 when running macos, and even then only partially so. Running Windows or Linux on your Mac using Boot Camp ( go.macworld. com/bcmp) makes you vulnerable to all of them.

HOW YOU COULD BE HACKED

The good news is that it would not necessaril­y be easy for a hacker to break into your Mac with these exploits. They have to have physical access to your computer and a prepared Thunderbol­t hacking device.

These sorts of vulnerabil­ities are often called “evil maid” threats. They require the attacker to have unimpeded and undetected access to your computer for at least a few minutes. It’s highly unlikely someone would be able to take advantage of these exploits if you closed the lid of your Macbook and stepped away from it for a minute in a coffee shop.

The worst of these vulnerabil­ities can happen while your Mac is in sleep mode, but not while it is powered off.

Intel has issued a statement ( go. macworld.com/istt) about these threats.

In 2019, major operating systems implemente­d Kernel Direct Memory Access (DMA) protection to mitigate against attacks such as these. This includes Windows (Windows 10 1803 RS4 and later), Linux (kernel 5.x and later), and MACOS (MACOS 10.12.4 and later). The researcher­s did not demonstrat­e successful DMA attacks against systems with these mitigation­s enabled. Please check with your system manufactur­er ( go.macworld.com/sysm)

to determine if your system has these mitigation­s incorporat­ed. For all systems, we recommend following standard security practices, including the use of only trusted peripheral­s and preventing unauthoriz­ed physical access to computers.

The real worry here is for Boot Camp users. When in Boot Camp, Apple has the Thunderbol­t controller set to security level “none” (SL0), which means a hacker with access to your computer running Boot Camp could easily access the contents of RAM or your hard drive, bypassing the lock screen.

For those running macos, make sure you have updated to at least macos 10.12.4. If you have, the practical dangers of the Thunderspy vulnerabil­ity are pretty narrow. If your version of macos is older, a hacker with physical access to your Thunderbol­t port could potentiall­y copy contents of RAM or storage.

Even with a fully up-to-date macos, a hacker could make a Thunderbol­t device that copies the legitimate security ID of an officially supported device, and then use it to execute some port-based attacks similar to what hackers can do on USB ports. Those tend to be slow and limited in scope compared to directly accessing the contents of your RAM or storage.

WHAT YOU SHOULD DO

Ruytenberg has suggested a number of things Mac users can do to help protect themselves:

> Connect only your own Thunderbol­t peripheral­s. Never lend them to anybody.

> Avoid leaving your system unattended while powered on, even when screen locked.

> Avoid leaving your Thunderbol­t peripheral­s unattended.

> Ensure appropriat­e physical security

when storing your system and any Thunderbol­t devices, including Thunderbol­t-powered displays.

> Consider using hibernatio­n (Suspend-to-disk) or powering off the system completely. Specifical­ly, avoid using sleep mode (Suspend-to-ram).

If you use Boot Camp to run Windows or Linux on your Mac, make sure it is powered down whenever it’s unattended. If you’re just running macos, make sure you have updated to the latest version of macos, and exercise the same precaution­s about Thunderbol­t devices as you should about USB devices. If you don’t know where a Thunderbol­t device has been, don’t plug it into your Mac, and don’t leave your Mac turned on (even if locked) and unattended where people can access it.

SHOULD YOU BE WORRIED?

Most Mac users should not be terribly concerned about this particular security vulnerabil­ity. If your macos install isn’t way out of date and you’re practicing good physical security (don’t leave your Mac turned on and unattended, don’t plug in devices if you don’t know where they’ve been) you don’t have a lot to fear from this avenue of attack. Remote attacks that use Wi-fi or Bluetooth, or attempt to infect your computer with software downloaded over the internet, are vastly more common than attacks like these that require physical access to your computer.

Users who run Boot Camp, especially in public places, should be particular­ly careful. When running Windows or Linux via Boot Camp, the Thunderbol­t port on a Mac is more or less wide open. We can probably expect Apple to issue a software update to make Boot Camp more secure in the near future. If you have to use Boot Camp, you should fully shut down your Mac whenever you leave it unattended. ■

 ??  ??
 ??  ?? Apple has the Thunderbol­t controller set to security level “none” (SL0) in Boot Camp, which is a real concern.
Apple has the Thunderbol­t controller set to security level “none” (SL0) in Boot Camp, which is a real concern.
 ??  ?? When running Windows or Linux via Boot Camp, the Thunderbol­t port is more or less wide open.
When running Windows or Linux via Boot Camp, the Thunderbol­t port is more or less wide open.

Newspapers in English

Newspapers from Australia