{"id":22368,"date":"2020-10-07T11:10:47","date_gmt":"2020-10-07T09:10:47","guid":{"rendered":"https:\/\/blog.netspark.de\/?p=22368"},"modified":"2020-10-07T11:10:47","modified_gmt":"2020-10-07T09:10:47","slug":"security-flaws-with-apples-t2-chip","status":"publish","type":"post","link":"https:\/\/blog.netspark.de\/?p=22368","title":{"rendered":"Security flaws with Apple&#8217;s T2 chip"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-Post-Thumb wp-image-5830\" src=\"https:\/\/blog.netspark.de\/wp-content\/uploads\/2013\/10\/Apple-logo-icon-Aluminum-64x64.png\" alt=\"\" width=\"64\" height=\"64\" srcset=\"https:\/\/blog.netspark.de\/wp-content\/uploads\/2013\/10\/Apple-logo-icon-Aluminum-64x64.png 64w, https:\/\/blog.netspark.de\/wp-content\/uploads\/2013\/10\/Apple-logo-icon-Aluminum-150x150.png 150w, https:\/\/blog.netspark.de\/wp-content\/uploads\/2013\/10\/Apple-logo-icon-Aluminum-480x480.png 480w, https:\/\/blog.netspark.de\/wp-content\/uploads\/2013\/10\/Apple-logo-icon-Aluminum.png 512w\" sizes=\"auto, (max-width: 64px) 100vw, 64px\" \/>When it comes to security, Apple still sets a high level.<br \/>\nHowever there are now issues with the T2 security chip<br \/>\nthat cannot be ironed out at all. This could allow hackers<br \/>\nto compromise T2-equipped devices easily via USB.<\/p>\n<p><!--more-->The main problem is that the T2 chip has a read-only section. All Macs sold since 2018 contain the T2 chip, and because the attack uses code in the read-only memory section of the chip, there is no way for Apple to patch it away.<\/p>\n<p>However it would need the help of two other exploits to allow the hacker to even deploy malware like keyloggers etc.<\/p>\n<p>ZDNet states the following in their <a href=\"https:\/\/www.zdnet.com\/article\/hackers-claim-they-can-now-jailbreak-apples-t2-security-chip\/\" target=\"_blank\" rel=\"noopener noreferrer\">post<\/a>:<\/p>\n<div class=\"post_citation\">\n<p>The attack requires combining two other exploits that were initially used for <a href=\"https:\/\/9to5mac.com\/2019\/11\/11\/checkra1n-first-public-jailbreak-tool-compatible-ios-13\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"undefined (opens in a new tab)\">jailbreaking iOS devices<\/a> \u2014 namely <a href=\"https:\/\/9to5mac.com\/2019\/09\/27\/ios-unpatchable-ios-exploit-jailbreak-iphone-x\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"undefined (opens in a new tab)\">Checkm8<\/a> and Blackbird. This works because of some shared hardware and software features between T2 chips and iPhones and their underlying hardware.<\/p>\n<p>According to a post from Belgian security firm <a href=\"https:\/\/ironpeak.be\/blog\/crouching-t2-hidden-danger\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"undefined (opens in a new tab)\">ironPeak<\/a>, jailbreaking a T2 security chip involves connecting to a Mac\/MacBook via USB-C and running version 0.11.0 of the Checkra1n jailbreaking software during the Mac\u2019s boot-up process.<\/p>\n<p>Per ironPeak, this works because \u201cApple left a debugging interface open in the T2 security chip shipping to customers, allowing anyone to enter Device Firmware Update (DFU) mode without authentication.\u201d<\/p>\n<p>\u201cUsing this method, it is possible to create an USB-C cable that can automatically exploit your macOS device on boot,\u201d ironPeak said.<\/p>\n<p>This allows an attacker to get root access on the T2 chip and modify and take control of anything running on the targeted device, even recovering encrypted data [\u2026]<\/p>\n<p>The danger regarding this new jailbreaking technique is pretty obvious. Any Mac or MacBook left unattended can be hacked by someone who can connect a USB-C cable, reboot the device, and then run Checkra1n 0.11.0.<\/p>\n<\/div>\n<p>This said, you should never leave your T2-equipped Apple device unattended as someone with skills could easily gain control over your device using the exploits mentioned above.<\/p>\n<p>ironPeak also made a good statement in this <a href=\"https:\/\/ironpeak.be\/blog\/crouching-t2-hidden-danger\/\" target=\"_blank\" rel=\"noopener noreferrer\">post<\/a>:<\/p>\n<div class=\"post_citation\">\n<p><strong>Recent Macs (2018-2020, T2 chip) are no longer safe to use if left alone and physical access was possible, even if you had them powered down.<\/strong><\/p>\n<ul>\n<li>The root of trust on macOS is inherently broken<\/li>\n<li>They can bruteforce your FileVault2 volume password<\/li>\n<li>They can alter your macOS installation<\/li>\n<li>They can load arbitrary kernel extensions<\/li>\n<\/ul>\n<\/div>\n<p>Conclusion: At the moment there&#8217;s nothing you can do about it except for buying a new Apple device with an updated T2-chip which can be a very pricey option. If Apple is going to do something about it on their own, is doubtful. Maybe another big lawsuit heading towards Apple enforced by a lot of angry MAC users might move Apple to either offer a replacement option or some other compensation for the security trust they&#8217;re now subject to.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to security, Apple still sets a high level. However there are now issues with the T2 security chip that cannot be ironed out at all. This could allow hackers to compromise T2-equipped devices easily via USB.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[55,4,3,2949],"tags":[385,2601,3501,4279,1810,2373,851],"class_list":["post-22368","post","type-post","status-publish","format-standard","hentry","category-computer-2","category-curiosities","category-news","category-technology","tag-apple","tag-breach","tag-chip","tag-enclave","tag-flaw","tag-jailbreak","tag-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.netspark.de\/index.php?rest_route=\/wp\/v2\/posts\/22368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.netspark.de\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.netspark.de\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.netspark.de\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.netspark.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=22368"}],"version-history":[{"count":0,"href":"https:\/\/blog.netspark.de\/index.php?rest_route=\/wp\/v2\/posts\/22368\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.netspark.de\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=22368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.netspark.de\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=22368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.netspark.de\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=22368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}