Jump to content

Welcome to ExtremeHW

Welcome to ExtremeHW, register to take part in our community, don't worry this is a simple FREE process that requires minimal information for you to signup.

 

Registered users can: 

  • Start new topics and reply to others.
  • Show off your PC using our Rig Creator feature.
  • Subscribe to topics and forums to get updates.
  • Get your own profile page to customize.
  • Send personal messages to other members.
  • Take advantage of site exclusive features.
  • Upgrade to Premium to unlock additional sites features.
IGNORED

Your Mac may be vulnerable to hackers, and it can't be patched — here's why


Recommended Posts

Quote

Belgian security consultant Niels Hofmans, writing on his blog yesterday (Oct. 5) as ironPeak, explained how he was able to jailbreak the T2 chip by running 0.11.0 of the checkra1n software via a USB-C connection while the Mac was booting up. 

 

The jailbreak left the T2’s debugging interface open to the user, allowing them to enter Device Firmware Update (DFU) without any authentication. It also means hackers who get their hands a Mac can get root access to the chip to modify and take control of anything running on the device — including encrypted data.

 

"Normally the T2 chip will exit with a fatal error if it is in DFU mode and it detects a decryption call, but thanks to the blackbird vulnerability by team Pangu, we can completely circumvent that check in the SEP and do whatever we please," Hofmans wrote.

 

He also included instructions and code to carry out the exploit in case you want to try it yourself.

 

 

Source

 

 

Looks like it's not a fixable issue and not even a firmware update will alleviate this.  It does not appear that this will follow the new MAC processors. 

Edited by axipher
  • Thanks 1

way too mu

Owned

 Share

CPU: AMD Ryzen 9 5950X
GPU: ASRock 6900XT
MOTHERBOARD: ASRock X570 Steel Legend
RAM: G.Skill Ripjaws V 64GB (4 x 16GB) DDR4-3600 PC4-28800 CL16 Dual Channel Desktop Memory Kit F4-3600C16D-32GVKC - Black
PSU: SeaSonic FOCUS Plus Gold 1000 W 80+ Gold
SSD/NVME: Samsung 980 Pro 2 TB M.2-2280
SSD/NVME 2: Samsung 850 evo 1TB SATA SSD
CASE: Fractal Torrent ATX Mid tower
Full Rig Info
Link to comment
Share on other sites

Premium Platinum - Lifetime
1.1k 540

Link? 

 

it does seem like it's local only, not online.

Owned

 Share

CPU: i7 9570H
GPU: AMD 5300m
RAM: 16GB
SSD/NVME: 512GB
OPERATING SYSTEM: macOS Sonoma
Full Rig Info

Owned

 Share

CPU: 5800X
GPU: RTX 2070
RAM: 32GB
SSD/NVME: 500GB 960 Evo
SSD/NVME 2: 1TB 860 Evo
SSD/NVME 3: 1TB 860 Evo
PSU: EVGA 650w Modular
OPERATING SYSTEM: Windows 11
Full Rig Info
Link to comment
Share on other sites

3 minutes ago, Andrew said:

Link? 

 

it does seem like it's local only, not online.

 

Source was quoted. Here are several others

 

https://www.zdnet.com/article/hackers-claim-they-can-now-jailbreak-apples-t2-security-chip/

 

https://hothardware.com/news/apple-t2-mac-security-chip-unpatchable-root-access-exploit

 

https://www.techradar.com/sg/news/your-macbook-might-be-hiding-a-major-security-vulnerability-heres-what-you-need-to-know

 

It's been confirmed and I verified it on a Macbook I have here in the lab.

 

Yes it's locally but T2 and TPM chips(for Dell and other systems) are specifically designed to prevent local attacks.

Edited by Darkpriest667

way too mu

Owned

 Share

CPU: AMD Ryzen 9 5950X
GPU: ASRock 6900XT
MOTHERBOARD: ASRock X570 Steel Legend
RAM: G.Skill Ripjaws V 64GB (4 x 16GB) DDR4-3600 PC4-28800 CL16 Dual Channel Desktop Memory Kit F4-3600C16D-32GVKC - Black
PSU: SeaSonic FOCUS Plus Gold 1000 W 80+ Gold
SSD/NVME: Samsung 980 Pro 2 TB M.2-2280
SSD/NVME 2: Samsung 850 evo 1TB SATA SSD
CASE: Fractal Torrent ATX Mid tower
Full Rig Info
Link to comment
Share on other sites

Premium Platinum - Lifetime
1.1k 540

I meant there's no source link to the Toms Hardware article.

 

But yeah. you do need physical access to the computer in order to make use of that exploit. That's how it has always been with Macs. Hacking into them remotely is near enough impossible, but if you have physical access to them, it's pretty easy. At least for the people who know what they're doing.

  • Thanks 1

Owned

 Share

CPU: i7 9570H
GPU: AMD 5300m
RAM: 16GB
SSD/NVME: 512GB
OPERATING SYSTEM: macOS Sonoma
Full Rig Info

Owned

 Share

CPU: 5800X
GPU: RTX 2070
RAM: 32GB
SSD/NVME: 500GB 960 Evo
SSD/NVME 2: 1TB 860 Evo
SSD/NVME 3: 1TB 860 Evo
PSU: EVGA 650w Modular
OPERATING SYSTEM: Windows 11
Full Rig Info
Link to comment
Share on other sites

Fortunately this is not a remote exploit...could you imagine lol.

£3000

Owned

 Share

CPU: AMD Ryzen 9 7950X3D
MOTHERBOARD: MSI Meg Ace X670E
RAM: Corsair Dominator Titanium 64GB (6000MT/s)
GPU: EVGA 3090 FTW Ultra Gaming
SSD/NVME: Corsair MP700 Pro SE Gen 5 4TB
PSU: EVGA Supernova T2 1600Watt
CASE: be quiet Dark Base Pro 900 Rev 2
FANS: Noctua NF-A14 industrialPPC x 6
Full Rig Info

Owned

 Share

CPU: Intel Core i5 8500
RAM: 16GB (2x8GB) Kingston 2666Mhz
SSD/NVME: 256GB Samsung NVMe
NETWORK: HP 561T 10Gbe (Intel X540 T2)
MOTHERBOARD: Proprietry
GPU: Intel UHD Graphics 630
PSU: 90Watt
CASE: HP EliteDesk 800 G4 SFF
Full Rig Info

£3000

Owned

 Share

CPU: 2 x Xeon|E5-2696-V4 (44C/88T)
RAM: 128GB|16 x 8GB - DDR4 2400MHz (2Rx8)
MOTHERBOARD: HP Z840|Intel C612 Chipset
GPU: Nvidia Quadro P2200
HDD: 4x 16TB Toshiba MG08ACA16TE Enterprise
SSD/NVME: Intel 512GB 670p NVMe (Main OS)
SSD/NVME 2: 2x WD RED 1TB NVMe (VM's)
SSD/NVME 3: 2x Seagate FireCuda 1TB SSD's (Apps)
Full Rig Info
Link to comment
Share on other sites

What would this enable a user to do? What would be the point of jailbreaking a Mac computer? 

null

Owned

 Share

CPU: 5800x
MOTHERBOARD: ASUS TUF Gaming B550-Plus
RAM: 32GB 3600mhz CL16
GPU: 7900XT
SOUNDCARD: Sound Blaster Z 5.1 home theater
MONITOR: 4K 65 inch TV
Full Rig Info
Link to comment
Share on other sites

30 minutes ago, UltraMega said:

What would this enable a user to do? What would be the point of jailbreaking a Mac computer? 

 

 

They can disable the onboard encryption and then steal the drive and download the data. Most of the people that use these and TPM/PCC chips tend to work in high security environments or think they do and are worried about espionage or valuable data being leaked. 

way too mu

Owned

 Share

CPU: AMD Ryzen 9 5950X
GPU: ASRock 6900XT
MOTHERBOARD: ASRock X570 Steel Legend
RAM: G.Skill Ripjaws V 64GB (4 x 16GB) DDR4-3600 PC4-28800 CL16 Dual Channel Desktop Memory Kit F4-3600C16D-32GVKC - Black
PSU: SeaSonic FOCUS Plus Gold 1000 W 80+ Gold
SSD/NVME: Samsung 980 Pro 2 TB M.2-2280
SSD/NVME 2: Samsung 850 evo 1TB SATA SSD
CASE: Fractal Torrent ATX Mid tower
Full Rig Info
Link to comment
Share on other sites

  • axipher changed the title to Your Mac may be vulnerable to hackers, and it can't be patched — here's why

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×
×
  • Create New...

Important Information

This Website may place and access certain Cookies on your computer. ExtremeHW uses Cookies to improve your experience of using the Website and to improve our range of products and services. ExtremeHW has carefully chosen these Cookies and has taken steps to ensure that your privacy is protected and respected at all times. All Cookies used by this Website are used in accordance with current UK and EU Cookie Law. For more information please see our Privacy Policy