Feedback & Followups
- Work continues on Apple & Google’s Exposure Notification API:
- Apple releases concepts for how exposure notification could look on iOS — www.imore.com/…
- Apple and Google to ban location tracking in contact tracing apps — www.imore.com/…
- Apple will let you delete coronavirus contact tracing data in iOS 13.5 — www.imore.com/…
- Related Opinion: Former Apple Engineer: Here’s Why I Trust Apple’s COVID-19 Notification Proposal — tidbits.com/…
- Governments around the world continue to work on exposure tracing apps, with varying degrees of success:
- 🇪🇺 European countries rally around cross-border contact tracing solution — www.imore.com/…
- 🇬🇧 UK now looking into adopting Apple and Google’s contact tracing tech — www.imore.com/…
- 🇦🇺 Australian government admits its COVIDSafe app doesn’t work on iOS — www.imore.com/…
- 🇸🇬 Spurred by low adoption of its app, Singapore introduces highly-invasive, mandatory COVID-19 surveillance — www.imore.com/…
- 🇺🇸 Utah rejects Apple and Google, builds its own contact tracing solution — www.imore.com/…
- Excellent Related Opinion Piece: Governments ignore Apple and Google’s contact tracing technology at their own peril — www.imore.com/…
- Zoom continues its security & privacy push: Zoom Purchases End-to-End Encryption Specialist Keybase — www.macobserver.com/…
- The controversial data-scraping AI facial recognition search engine Clearview has told a US court it will stop selling its product to private companies, and that it will stop selling to any organisation in Illinois, and take steps to stop scraping photos of Illinois residents. The court filings also revealed it is working on a tool to allow people to opt-out of their controversial database — Clearview AI won’t sell vast faceprint collection to private companies — nakedsecurity.sophos.com/…
- Social Media companies continue to try clean up their platforms:
- Google are continuing to try to clean up their browser extension ecosystem: More crypto-stealing Chrome extensions swatted by Google — nakedsecurity.sophos.com/…
- The roll-out of DoH continues: Microsoft joins encrypted DNS club with Windows 10 option — nakedsecurity.sophos.com/…
Deep Dive — The ThunderSpy Thunderbolt Vulnerabilities
TL;DR None of these exploits can be carried out remotely, all require physical access, but, they do let attackers extract the contents of your computer’s RAM, and that’s extremely dangerous. The only protection is to physically block the port, or, to always power your computer down rather than putting it to sleep while it’s out of your sight. PCs are much more badly affected than Macs unless you use Bootcamp, in which case you’re completely open to attack while booted into Windows or Linux on your Mac. These vulnerabilities leave important people exposed, but are unlikely to affect regular folks.
Security researcher Björn Ruytenberg from the Eindhoven University of Technology has released a paper detailing seven vulnerabilities in Thunderbolt, and to help make them easier to talk about (or to get more media attention), he’s given these bugs the catchy name Thunderspy.
Thunderbolt’s big selling point is its speed, and it can achieve that because it has something called Direct Memory Access, or DMA. In effect, Thunderbolt connectors are low-level system busses projected off the motherboard and out into the big bad world. DMA allows Thunderbolt to access RAM without asking the CPU for help or permission! That is inherently dangerous, and the only way to provide any protection is to apply some kind of low-level fire-walling or filtering right on the Thunderbolt controller.
The Thunderbolt spec allows OSes to enable some fire-walling of Thunderbolt DMA, but unfortunately for PC users, Apple are the only OS vendor to deploy support for these features, at least for now. This is why Macs are less susceptible to these bugs.
Before we look at the bugs themselves, it’s important to underline the danger un-fettered DMA poses — an attacker can literally read all the RAM from your computer through your Thunderbolt port! That means every key and password in RAM can be read, including the keys for things like full disk encryption, and the private keys for any asymmetric encryption you’re using at the time of the attack.
The only protection is to have nothing in RAM, and the only way to achieve that is to shut the computer down rather than putting it to sleep.
All Thunderbolt controllers are made by Intel, and unfortunately, Intel have not done a great job implementing Thunderbolt. The problems fall into two categories:
- The specification does not provide any way cryptographic mechanism for digitally signing device metadata, so Thunderbolt devices can be trivially cloned. If your computer trusts a device, an attacker can make their evil hacking dongle appear to be your trusted device.
- While the specification does support digitally signed firmware, Intel’s implementation does a really bad job of checking the signatures, so, while it shouldn’t be possible to put malicious firmware on Thunderbolt connectors, it actually is.
There is no way to fix the first problem without re-designing the specification, so the best we can hope for there is that Thunderbolt 4 addresses this problem.
The second category if problems could be fixed with better Thunderbolt 2 & 3 controllers.
These two different categories of flaw can be exploited in two different ways:
- Evil Maid Attacks — someone with physical knowledge but no technical access could exploit these vulnerabilities if they have access to both the target computer, and a Thunderbolt device trusted by that computer (like a monitor or a dock). The evil maid would also need to have been given some kind of hardware hacking tool by the mastermind behind the attack. The attack would have two steps:
- Plug the trusted device into the hacking tool so it can clone the metadata
- Plug the hacking tool into the target computer while it is on or asleep.
- Evil Techie Attacks — someone with physical access, some tools, and a lot of expertise could open the computer, find the Thunderbolt controller, connect a hacking tool to it, and replace the firmware with malicious firmware.
So, just to reiterate, the only reliable defence from both of these scenarios is to keep your computer powered down when it’s out of your physical control. For regular people that probably only comes into play when crossing borders into or out of countries with governments you don’t trust. For high-value targets, that’s something they’ll always need to bear in mind.
Macs are Less Affected than PCs?
According to the paper, all Mac and PC hardware with Thunderbolt 2 or Thunderbolt 3 are equally affected, there are no secure Thunderbolt chips available.
When it comes to OSes though things are a little more complicated.
For both Windows and Linux running on PC hardware, the picture is very simple — they are susceptible to all the vulnerabilities except the Bootcamp one.
On Macs running macOS things are a lot better (quote from the research paper):
Regarding Thunderbolt security, macOS employs (i) an Apple-curated whitelist in place of Security Levels, and (ii) IOMMU virtualization when hardware and driver support is available. Vulnerabilities 2–3 enable bypassing the first protection measure, and fully compromising authenticity of Thunderbolt device metadata in macOS System Information [app]. However, the second protection measure remains functioning and hence prevents any further impact on victim system security via DMA. The system becomes vulnerable to attacks similar to BadUSB. Therefore, MacOS is partially affected.
When you throw Bootcamp into the mix things become more complicated though. Rather than try to explain it I’ll just quote this table from the research paper:
Vulnerabilities affecting Apple Mac systems when running macOS, as well as Windows and Linux when using Boot Camp:
Vulnerability ID Affects MacOS Affects Windows Affects Linux 1 No Yes Yes 2 Partially Yes Yes 3 Partially Yes Yes 4 No Yes Yes 5 No No No 6 No No No 7 No Yes Yes
The Bottom Line
If your computer has Thunderbolt 2 or 3, and it’s going to be out of your control in an environment where you have reason to worry someone might try to extract data from it, power it down, don’t just put it to sleep.
Links
- The vulnerability’s home page — thunderspy.io/…
- The research paper (surprisingly readable but in PDF format) — thunderspy.io/…
- Thunderspy – why turning your computer off is a cool idea! — nakedsecurity.sophos.com/…
❗ Action Alerts
- Last Tuesday was Patch Tuesday, there are critical fixes from Microsoft & Adobe — krebsonsecurity.com/…
- Adobe Acrobat Reader Flaws Could Let Attacks Hijack Your Mac — tidbits.com/… & There’s a flaw in Adobe Acrobat Reader that gives people root access to your Mac — www.imore.com/…
- PrintDemon – patch this ancient Windows printer bug! — nakedsecurity.sophos.com/…
- Update now! Windows gets another bumper patch update — nakedsecurity.sophos.com/…
- Firefox 76 patches a number of critical bugs, but, also ads improvements to its built-in password manager including Vulnerable Password warnings — nakedsecurity.sophos.com/…
Worthy Warnings
- As expected, cybercriminals are adapting to the pandemic — be extra vigilant in these stressful times!:
- A new variant of the common tech support scam is becoming popular — the attackers claim to be from ‘Microsoft Support’ and threaten to suspend the victim’s Windows license because their IP address has been caught viewing child pornography — krebsonsecurity.com/…
- Coronavirus pandemic coincides with spike in online puppy scams — nakedsecurity.sophos.com/…
- Beware the DHL delivery message email – it could be a package scam — nakedsecurity.sophos.com/…
- 🇺🇸 U.S. Secret Service: “Massive Fraud” Against State Unemployment Insurance Programs — krebsonsecurity.com/…
- 🇬🇧 UK users targeted by malicious, fake contact tracing text messages — www.imore.com/…
- GoDaddy – “unauthorized individual” had access to login info — nakedsecurity.sophos.com/…
- User data from the dating app Mobifriends has been found on a hacking forum — nakedsecurity.sophos.com/…
- Adult live-streaming site CAM4 leaks millions of emails, private chats — nakedsecurity.sophos.com/…
- 🇺🇸 Meant to Combat ID Theft, Unemployment Benefits Letter Prompts ID Theft Worries — krebsonsecurity.com/…
Notable News
- Facebook is buying Giphy, the world’s leading animated GIF provider, and that brings up all sorts of privacy concerns: Buying Giphy Gives Facebook a New Window Into Its Rivals — www.wired.com/…
- You Can Now Lock Google Drive on iOS With Face ID, Touch ID — www.macobserver.com/…
- Nest Introducing Two-Factor Authentication For All Users This Month — www.macobserver.com/…
- Microsoft have launched a $100K bug bounty program for their Azure Sphere IoT security platform — nakedsecurity.sophos.com/…
- Security researchers have found a new variant of the Remote Access Tool (RAT) used by the notorious Lazarus Group cybercrime gang which targets the Mac — www.macobserver.com/…
- Editorial by Bart: There’s no need to panic, regular users are not likely to be targeted by the Lazarus Group, this story is noteworthy because it illustrates that attackers are continuing to turn their attention towards Macs, so there remains absolutely no place for complacency!
- 🇺🇸 Senate Vote Lets FBI View Your Browsing History Without Warrant — www.macobserver.com/…
Top Tips
- How to use Windows 10’s Quick Assist app for remote PC support — www.computerworld.com/…
- 10 Things You Shouldn’t Do on Your Work Computer (or Phone) — www.intego.com/…
- Ask iFixit: I Spilled Liquid on My Laptop—Now What? — www.ifixit.com/…
Interesting Insights
- Huge toll of ransomware attacks revealed in Sophos report — nakedsecurity.sophos.com/…
> Overall, the research found that while a malicious file download or link was still the biggest danger (29% of successful attacks), other methods such as remote attacks on servers (21%), unsecured Remote Desktop Protocol (9%), external suppliers (9%), and infected USB drives (7%) were also popular.
>
> …
>
> Research found that paying ransoms costs more than reinstating data using backups. - Key Moments in the History of Mac Malware – 1982 to the Present — www.intego.com/…
- Top 10 most exploited vulnerabilities list released by FBI, DHS CISA — nakedsecurity.sophos.com/…
- A great explanation of a technique spammers are now using to make their malicious links look like Google links: How scammers abuse Google Search’s open redirect feature — nakedsecurity.sophos.com/…
Just Because it’s Cool 😎
Palate Cleansers
- From Bart:
- Preprint — xkcd.com/…
- 🎧 Podcast Recommendation — Commencement, speeches of the class of 2020 who are being deprived of regular commencement ceremonies as a podcast. Lots of great episodes, but my favourite so far is the one by podcaster and story-teller Aaron Mahnke.
- From Allison:
- 🎦 “Voice Driven Development: Who needs a keyboard anyway?” by Emily Shea — www.youtube.com/…
- Note that she starts by saying she’s using Dragon from Nuance on Mac but does point out that’s been discontinued, unfortunately. But she does go on to explain that you can use the recognition engine built into Talon (the tool that allowed her to create her own language)
Legend
When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by Bart.
Emoji | Meaning |
---|---|
🎧 | A link to audio content, probably a podcast. |
❗ | A call to action. |
flag | The story is particularly relevant to people living in a specific country, or, the organisation the story is about is affiliated with the government of a specific country. |
📊 | A link to graphical content, probably a chart, graph, or diagram. |
🧯 | A story that has been over-hyped in the media, or, “no need to light your hair on fire” 🙂 |
💵 | A link to an article behind a paywall. |
📌 | A pinned story, i.e. one to keep an eye on that’s likely to develop into something significant in the future. |
🎩 | A tip of the hat to thank a member of the community for bringing the story to our attention. |
Just an FYI, there is a slightly less advanced version of the Microsoft Quick Assist app built into earlier versions of Windows (such as Windows 7). And in fact, Windows 10 includes the older version as a separate executable (“Windows Remote Assistant”) in order to give some backwards compatibility. Howtogeek runs through the scenarios:
https://www.howtogeek.com/268808/how-to-use-windows-10s-quick-assist-to-remotely-troubleshoot-a-friends-pc/
Kurt