Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Newly leaked documents show low-level CIA Mac and iPhone hacks

Lucian Constantin | March 24, 2017
For years, the CIA has known of implants for iPhones and low-level rootkits for Macbooks.

Credit: CIA

The U.S. CIA has had tools to infect Apple Mac computers by connecting malicious Thunderbolt Ethernet adapters to them since 2012, according to new documents purported to be from the agency and published by WikiLeaks.

One of the documents, dated Nov. 29, 2012, is a manual from the CIA's Information Operations Center on the use of a technology codenamed Sonic Screwdriver. It is described as "a mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting."

Sonic Screwdriver allows the CIA to modify the firmware of an Apple Thunderbolt-to-Ethernet adapter so that it forces a Macbook to boot from an USB stick or DVD disc even when its boot options are password protected.

For example, Sonic Screwdriver can be used to boot into a Linux live CD so that the Macbook's partitions and data can be accessed from outside macOS, the manual says.

More importantly, an adapter modified by Sonic Screwdriver can be used to execute Der Starke, a fileless macOS malware program that has a persistence component installed in the computer's EFI (Extensible Firmware Interface).

The EFI or UEFI is the low-level firmware that initiates and configures the computer's hardware components before starting the actual operating system. It is the modern equivalent of the BIOS.

An EFI implant, or rootkit, can inject malicious code inside the operating system's kernel during the boot process and will survive even if the OS is fully reinstalled or the hard disk drive is changed.

Der Starke is described in another CIA document that was leaked Thursday as "a diskless, EFI-persistent version of Triton," which is "an automated implant for Mac OS X" -- spying malware that can steal data and send it to a remote server.

An older implant, and possibly Der Starke's precursor, is described in a document from 2009 for Macbook Air computers under the codename DarkSeaSkies. It too has an EFI persistence module and includes a user-space module codenamed Nightskies.

What's interesting about Nightskies is that it was ported to the Macbook Air from a version for iPhones. According to WikiLeaks, the iPhone version of Nightskies is designed to be physically installed onto factory fresh phones.

This suggests that the CIA is compromising the supply chain and is potentially intercepting and infecting electronic device shipments before they reach the final buyer. Documents leaked by Edward Snowden in 2013 suggested that the U.S. National Security Intelligence Agency engages in similar practices.

The ability to install rootkits inside the EFI of Mac computers is not new. Australian security researcher Loukas K, better known in the security community as Snare, presented a proof-of-concept EFI rootkit for Macs at the Black Hat security conference in 2012. Snare has since been hired by Apple.


1  2  Next Page 

Sign up for Computerworld eNewsletters.