• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechChanging Face of Security

This Apple computer bug sounds incredibly nasty

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
August 3, 2015, 12:52 PM ET
Chinese customers are experiencing and choosing Apple's
Chinese customers are experiencing and choosing Apple's products in an Apple store beside West lake in Hangzhou, which is the biggest Apple store in Asia.Zhang Peng LightRocket via Getty Images

If you think Apple computers are safer than their Windows-powered cousins, think again.

Security researchers say they’ve crafted a computer worm that can burrow deep inside Mac computers, beyond the scrutiny of anti-virus scanners. From there, it can spread between devices that are not networked by hitching a ride on a Thunderbolt Ethernet adapter, writing itself into a machine’s firmware and remaining undetected.

The vicious worm, dubbed Thunderstrike 2, can even evade a whole system reboot.

“For most users that’s really a throw-your-machine-away kind of situation,” said Xeno Kovah, the head of security startup LegbaCore, who discovered the vulnerabilities and helped create the proof-of-concept worm, in an interview with Wired. “ Most people and organizations don’t have the wherewithal to physically open up their machine and electrically reprogram the chip.”

MORE: Apple just lost its Chinese smartphone crown

The research builds on work that Kovah and his associate Corey Kallenberg undertook last year. At the time, the team identified several vulnerabilities in the firmware of Dell, Lenovo (LNVGY), Samsung (SSNLF), and HP (HPQ) PCs.

In the latest probe, Kovah partnered with Trammell Hudson, a security engineer at investment management firm Two Sigma Investments. They found five-in-six of those previously uncovered bugs applied to Macs as well. The flaws are more pervasive than previously thought since many hardware makers share firmware code.

Unnervingly, the worm can be transmitted via unassuming computer accessories, like the aforementioned Ethernet adapter. That makes this attack a potential vector for compromising air-gapped computers, which are usually considered more secure.

MORE: The extraordinary reinvention of Square

“People are unaware that these small cheap devices can actually infect their firmware,” Kovah said. “If people don’t have awareness that attacks can be happening at this level then they’re going to have their guard down and an attack will be able to completely subvert their system.”

According to Wired, most of the bugs remain unfixed . Apple (AAPL) has “fully patched one and partially patched the other. But three of the vulnerabilities remain unpatched,” writes Wired’s Kim Zetter. Apple did not immediately respond to Coins2Day‘s request for comment.

The team plans to present its research at the Black Hat and Def Con security conferences in Las Vegas this week. You can watch a video preview of the attack below, or read the rest on Wired.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.