Sick Gaming
AppleInsider - A custom USB-C cable can jailbreak the T2 chip in a MacBook Pro - Printable Version

+- Sick Gaming (https://www.sickgaming.net)
+-- Forum: Computers (https://www.sickgaming.net/forum-86.html)
+--- Forum: Apples Mac and OS X (https://www.sickgaming.net/forum-87.html)
+--- Thread: AppleInsider - A custom USB-C cable can jailbreak the T2 chip in a MacBook Pro (/thread-97724.html)



AppleInsider - A custom USB-C cable can jailbreak the T2 chip in a MacBook Pro - xSicKxBot - 10-13-2020

A custom USB-C cable can jailbreak the T2 chip in a MacBook Pro

<div style="margin: 5px 5% 10px 5%;"><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/10/a-custom-usb-c-cable-can-jailbreak-the-t2-chip-in-a-macbook-pro.jpg" width="871" height="653" title="" alt="" /></div><div><div><img src="https://www.sickgaming.net/blog/wp-content/uploads/2020/10/a-custom-usb-c-cable-can-jailbreak-the-t2-chip-in-a-macbook-pro.jpg" class="ff-og-image-inserted"></div>
<p>The security researchers that found a vulnerability in Apple’s T2 chip have developed an exploit using a clone of an internal debugging cable that can hack a Mac without user action.
</p>
<div class="col-sm-12">
<p>Earlier in October, the checkra1n team disclosed the <a href="https://appleinsider.com/articles/20/10/05/apples-mac-t2-chip-has-an-unfixable-vulnerability-that-could-allow-root-access">unfixable vulnerability</a> that essentially allows an attacker to jailbreak the T2 security chip in a Mac. Once they do, all types of malicious attacks can be carried out on an affected <a href="https://appleinsider.com/inside/macos">macOS</a> device.
</p>
</div>
<div class="col-sm-12">
<p>Now, the team has demoed a real-world attack that takes advantage of a specialized USB-C cable used internally by Apple for debugging.
</p>
</div>
<div class="col-sm-12 embed">
<div class="align-center">
<iframe class='youtube-player' width='980' height='552' src='https://www.youtube.com/embed/LRoTr0HQP1U?version=3&rel=1&fs=1&autohide=2&showsearch=0&showinfo=1&iv_load_policy=1&wmode=transparent' allowfullscreen='true' style='border:0;'></iframe>
</div>
</div>
<div class="col-sm-12">
<p>As depicted in a YouTube video, the exploit causes a machine to crash once the cable is plugged in. A second video posted to the team’s YouTube account showed that the attack was successfully by modifying the Apple logo at boot.
</p>
</div>
<div class="col-sm-12 embed">
<div class="align-center">
<iframe class='youtube-player' width='980' height='552' src='https://www.youtube.com/embed/uDSPlpEP-T0?version=3&rel=1&fs=1&autohide=2&showsearch=0&showinfo=1&iv_load_policy=1&wmode=transparent' allowfullscreen='true' style='border:0;'></iframe>
</div>
</div>
<div class="col-sm-12">
<p>The attack is carried out by a specialized debug probe cable used by Apple and known internally as “Kong,” “Kanzi,” or “Chimp.” These cables work by allowing access to special debug pins within a USB port for the CPU and other chips.
</p>
</div>
<div class="col-sm-12">
<p>these “Chimp” cables have leaked from Cupertino and Apple retail in the past, but security researcher Ramtin Amin created an effective clone of the cable. Combined with the checkra1n team’s exploits, it allows for this type of attack to be carried out.
</p>
</div>
<div class="col-sm-12">
<p>Although the video demonstration shows they modifying the Apple logo, the team notes that the same exploit can be used to replace a device’s EFI and upload a keylogger. That’s possible because a mobile Mac’s keyboard is connected directly to the T2 chip.
</p>
</div>
<div class="col-sm-12">
<p>The proof-of-concept exploit was disclosed by checkra1n security researchers Rick Mark, Mrarm, Aun-Ali Zaidi, and Home3us34. The team also announced that a version of the cable will soon be available for sale.
</p>
</div>
<p><h2>Who’s at risk, and how to protect yourself</h2>
</p>
<div class="col-sm-12">
<p>As noted earlier, these specialized debug cables can sometimes be found in the wild. With a commercial clone soon to be available, there’s a good chance that most Mac models on the market with a T2 chip could be vulnerable.
</p>
</div>
<div class="col-sm-12">
<p>Of course, the attack requires direct physical access to a Mac, which rules out most types of scenarios for the average user.
</p>
</div>
<div class="col-sm-12">
<p>However, users who may find themselves targeted by nation-states or cybercriminals should ensure that they have keep their MacBook or Mac safe by ensuring no one they don’t trust has physical access to it.</p>
</div>
</div>


https://www.sickgaming.net/blog/2020/10/13/a-custom-usb-c-cable-can-jailbreak-the-t2-chip-in-a-macbook-pro/