{"id":119252,"date":"2020-10-13T14:18:01","date_gmt":"2020-10-13T14:18:01","guid":{"rendered":"https:\/\/appleinsider.com\/articles\/20\/10\/13\/a-custom-usb-c-cable-can-jailbreak-the-t2-chip-in-a-macbook-pro"},"modified":"2020-10-13T14:18:01","modified_gmt":"2020-10-13T14:18:01","slug":"a-custom-usb-c-cable-can-jailbreak-the-t2-chip-in-a-macbook-pro","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2020\/10\/13\/a-custom-usb-c-cable-can-jailbreak-the-t2-chip-in-a-macbook-pro\/","title":{"rendered":"A custom USB-C cable can jailbreak the T2 chip in a MacBook Pro"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2020\/10\/a-custom-usb-c-cable-can-jailbreak-the-t2-chip-in-a-macbook-pro.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The security researchers that found a vulnerability in Apple&#8217;s T2 chip have developed an exploit using a clone of an internal debugging cable that can hack a Mac without user action.\n<\/p>\n<div class=\"col-sm-12\">\n<p>Earlier in October, the checkra1n team disclosed the <a href=\"https:\/\/appleinsider.com\/articles\/20\/10\/05\/apples-mac-t2-chip-has-an-unfixable-vulnerability-that-could-allow-root-access\">unfixable vulnerability<\/a> that essentially allows an attacker to jailbreak the T2 security chip in a Mac. Once they do, all types of malicious attacks can be carried out on an affected <a href=\"https:\/\/appleinsider.com\/inside\/macos\">macOS<\/a> device.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>Now, the team has demoed a real-world attack that takes advantage of a specialized USB-C cable used internally by Apple for debugging.\n<\/p>\n<\/div>\n<div class=\"col-sm-12 embed\">\n<div class=\"align-center\">\n<p>[youtube https:\/\/www.youtube.com\/watch?v=LRoTr0HQP1U]<\/p>\n<\/div>\n<\/div>\n<div class=\"col-sm-12\">\n<p>As depicted in a YouTube video, the exploit causes a machine to crash once the cable is plugged in. A second video posted to the team&#8217;s YouTube account showed that the attack was successfully by modifying the Apple logo at boot.\n<\/p>\n<\/div>\n<div class=\"col-sm-12 embed\">\n<div class=\"align-center\">\n<p>[youtube https:\/\/www.youtube.com\/watch?v=uDSPlpEP-T0]<\/p>\n<\/div>\n<\/div>\n<div class=\"col-sm-12\">\n<p>The attack is carried out by a specialized debug probe cable used by Apple and known internally as &#8220;Kong,&#8221; &#8220;Kanzi,&#8221; or &#8220;Chimp.&#8221; These cables work by allowing access to special debug pins within a USB port for the CPU and other chips.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>these &#8220;Chimp&#8221; cables have leaked from Cupertino and Apple retail in the past, but security researcher Ramtin Amin created an effective clone of the cable. Combined with the checkra1n team&#8217;s exploits, it allows for this type of attack to be carried out.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>Although the video demonstration shows they modifying the Apple logo, the team notes that the same exploit can be used to replace a device&#8217;s EFI and upload a keylogger. That&#8217;s possible because a mobile Mac&#8217;s keyboard is connected directly to the T2 chip.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>The proof-of-concept exploit was disclosed by checkra1n security researchers Rick Mark, Mrarm, Aun-Ali Zaidi, and Home3us34. The team also announced that a version of the cable will soon be available for sale.\n<\/p>\n<\/div>\n<p><h2>Who&#8217;s at risk, and how to protect yourself<\/h2>\n<\/p>\n<div class=\"col-sm-12\">\n<p>As noted earlier, these specialized debug cables can sometimes be found in the wild. With a commercial clone soon to be available, there&#8217;s a good chance that most Mac models on the market with a T2 chip could be vulnerable.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>Of course, the attack requires direct physical access to a Mac, which rules out most types of scenarios for the average user.\n<\/p>\n<\/div>\n<div class=\"col-sm-12\">\n<p>However, users who may find themselves targeted by nation-states or cybercriminals should ensure that they have keep their MacBook or Mac safe by ensuring no one they don&#8217;t trust has physical access to it.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The security researchers that found a vulnerability in Apple&#8217;s T2 chip have developed an exploit using a clone of an internal debugging cable that can hack a Mac without user action. Earlier in October, the checkra1n team disclosed the unfixable vulnerability that essentially allows an attacker to jailbreak the T2 security chip in a Mac. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":119253,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[57],"tags":[],"class_list":["post-119252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apple-insider"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/119252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=119252"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/119252\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/119253"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=119252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=119252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=119252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}