Create an account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
AppleInsider - A custom USB-C cable can jailbreak the T2 chip in a MacBook Pro

#1
A custom USB-C cable can jailbreak the T2 chip in a MacBook Pro

<div style="margin: 5px 5% 10px 5%;"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/10/a-custom-usb-c-cable-can-jailbreak-the-t2-chip-in-a-macbook-pro.jpg" width="871" height="653" title="" alt="" /></div><div><div><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/10/a-custom-usb-c-cable-can-jailbreak-the-t2-chip-in-a-macbook-pro.jpg" class="ff-og-image-inserted"></div>
<p>The security researchers that found a vulnerability in Apple’s T2 chip have developed an exploit using a clone of an internal debugging cable that can hack a Mac without user action.
</p>
<div class="col-sm-12">
<p>Earlier in October, the checkra1n team disclosed the <a href="https://appleinsider.com/articles/20/10/05/apples-mac-t2-chip-has-an-unfixable-vulnerability-that-could-allow-root-access">unfixable vulnerability</a> that essentially allows an attacker to jailbreak the T2 security chip in a Mac. Once they do, all types of malicious attacks can be carried out on an affected <a href="https://appleinsider.com/inside/macos">macOS</a> device.
</p>
</div>
<div class="col-sm-12">
<p>Now, the team has demoed a real-world attack that takes advantage of a specialized USB-C cable used internally by Apple for debugging.
</p>
</div>
<div class="col-sm-12 embed">
<div class="align-center">
<iframe class='youtube-player' width='980' height='552' src='https://www.youtube.com/embed/LRoTr0HQP1U?version=3&rel=1&fs=1&autohide=2&showsearch=0&showinfo=1&iv_load_policy=1&wmode=transparent' allowfullscreen='true' style='border:0;'></iframe>
</div>
</div>
<div class="col-sm-12">
<p>As depicted in a YouTube video, the exploit causes a machine to crash once the cable is plugged in. A second video posted to the team’s YouTube account showed that the attack was successfully by modifying the Apple logo at boot.
</p>
</div>
<div class="col-sm-12 embed">
<div class="align-center">
<iframe class='youtube-player' width='980' height='552' src='https://www.youtube.com/embed/uDSPlpEP-T0?version=3&rel=1&fs=1&autohide=2&showsearch=0&showinfo=1&iv_load_policy=1&wmode=transparent' allowfullscreen='true' style='border:0;'></iframe>
</div>
</div>
<div class="col-sm-12">
<p>The attack is carried out by a specialized debug probe cable used by Apple and known internally as “Kong,” “Kanzi,” or “Chimp.” These cables work by allowing access to special debug pins within a USB port for the CPU and other chips.
</p>
</div>
<div class="col-sm-12">
<p>these “Chimp” cables have leaked from Cupertino and Apple retail in the past, but security researcher Ramtin Amin created an effective clone of the cable. Combined with the checkra1n team’s exploits, it allows for this type of attack to be carried out.
</p>
</div>
<div class="col-sm-12">
<p>Although the video demonstration shows they modifying the Apple logo, the team notes that the same exploit can be used to replace a device’s EFI and upload a keylogger. That’s possible because a mobile Mac’s keyboard is connected directly to the T2 chip.
</p>
</div>
<div class="col-sm-12">
<p>The proof-of-concept exploit was disclosed by checkra1n security researchers Rick Mark, Mrarm, Aun-Ali Zaidi, and Home3us34. The team also announced that a version of the cable will soon be available for sale.
</p>
</div>
<p><h2>Who’s at risk, and how to protect yourself</h2>
</p>
<div class="col-sm-12">
<p>As noted earlier, these specialized debug cables can sometimes be found in the wild. With a commercial clone soon to be available, there’s a good chance that most Mac models on the market with a T2 chip could be vulnerable.
</p>
</div>
<div class="col-sm-12">
<p>Of course, the attack requires direct physical access to a Mac, which rules out most types of scenarios for the average user.
</p>
</div>
<div class="col-sm-12">
<p>However, users who may find themselves targeted by nation-states or cybercriminals should ensure that they have keep their MacBook or Mac safe by ensuring no one they don’t trust has physical access to it.</p>
</div>
</div>


https://www.sickgaming.net/blog/2020/10/...cbook-pro/
Reply



Possibly Related Threads…
Thread Author Replies Views Last Post
  AppleInsider - This M1 Max MacBook Pro 16-inch with 64GB RAM is in stock for $2,299 xSicKxBot 0 728 09-07-2023, 10:28 AM
Last Post: xSicKxBot
  AppleInsider - Apple sued over ‘stage light’ MacBook Pro display issue xSicKxBot 0 851 08-20-2020, 03:16 PM
Last Post: xSicKxBot
  AppleInsider - Sofia Coppola to adapt novel ‘The Custom of the Country’ for Apple TV+ xSicKxBot 0 776 05-13-2020, 12:45 AM
Last Post: xSicKxBot
  AppleInsider - Apple sued over 2016 MacBook Pro ‘stage lighting’ issue xSicKxBot 0 815 05-06-2020, 08:25 PM
Last Post: xSicKxBot
  AppleInsider - New AirPods could launch in May alongside MacBook Pro refresh xSicKxBot 0 829 04-19-2020, 07:15 PM
Last Post: xSicKxBot
  AppleInsider - Apple to release new 13-inch MacBook Pro in May, leaker claims xSicKxBot 0 939 04-06-2020, 05:15 PM
Last Post: xSicKxBot
  AppleInsider - 2020 iPad Pro models feature 6GB of RAM, U1 chip across the board xSicKxBot 0 977 03-19-2020, 07:23 AM
Last Post: xSicKxBot
  AppleInsider - This 8-core 16-inch MacBook Pro deal ends tonight xSicKxBot 0 851 02-09-2020, 03:51 AM
Last Post: xSicKxBot
  AppleInsider - Best MacBook Pro blowout deals: save up to $3,300 instantly xSicKxBot 0 909 02-08-2020, 10:36 AM
Last Post: xSicKxBot
  AppleInsider - Apple now allows developers to distribute custom apps to schools xSicKxBot 0 864 02-07-2020, 06:08 AM
Last Post: xSicKxBot

Forum Jump:


Users browsing this thread:
1 Guest(s)

Forum software by © MyBB Theme © iAndrew 2016