Skip to the main content.

1 min read

A New, Undetectable Threat to Your Mac – Understanding the Risks of Thunderstrike

Mac virusMany consumers still assume that Macs are immune to network viruses – this is a common misconception and it’s just not true.

There’s a wide array of malware and viruses out there that can affect Mac computers, and the latest one is an especially huge threat: it’s nearly impossible to detect and remove.

A New Threat

A virus known as Thunderstrike has been discovered by security researcher Trammel Hudson who found that he could replace a MacBook’s Boot ROM by plugging a modified adapter into the laptop’s Thunderbolt port. The Boot ROM is the very first piece of code that runs on a computer when you turn it on, so if it gets replaced by a virus it would be unable to be detected by anti-virus software or virtually any other security features. Currently, there’s nothing in the OS X that can scan for Thunderstrike’s presence.

The bug controls the system from the time it first enters and can log keystrokes, including disc encryption keys, place backdoors into the OS X kernel and bypass firmware passwords. It can affect any MacBook Pro, Air or Retina that has a Thunderbolt port.

Protect Yourself

Apple is trying to develop a fix to prevent criminals from loading viruses into Macs via the Thunderbolt port. Unfortunately, until a fix is found, there’s not a lot consumers can do to protect themselves. There’s no software that can remove it since the bug controls the signing keys and update routines. Likewise, reinstallation of OS X won’t get rid of it, nor will replacing the SSD since there’s nothing stored on the drive.

The best protection possible is to keep an eye on your computer at all times.

Don’t leave your Mac unattached in public places or hotel rooms where someone could get the opportunity to plug a virus-infected adapter into your port. Even with Apple’s fix, your computer isn’t always completely safe. With a bit more effort, someone interested in messing with your computer can take it apart and get access to your boot ROM directly.

Understand the risks facing the sensitive personal and business data stored on your Mac, and keep yourself safe. For more information on Thunderstrike or other security solutions for your technology, contact {company} at {email}, or reach out to us directly by phone at {phone}.

USB Thief Appears Undetected, Then Leaves With Your Sensitive Information

USB Thief Appears Undetected, Then Leaves With Your Sensitive Information

By now, most people are aware of the harm that both viruses and malware can do to your sensitive information. This is also an issue that small...

Read More
Wisdom Wednesday: Sifting Through Spam: Understanding The Dangers Of Junk Mail

Wisdom Wednesday: Sifting Through Spam: Understanding The Dangers Of Junk Mail

Every day, businesses and individuals send over 205 billion emails all over the world. Though many of these messages contain valuable information, a...

Read More
Understand the GDPR Compliance Requirements

1 min read

Understand the GDPR Compliance Requirements

GDPR regulations for Europe go into effect very soon, but is your organization ready for the rigor required by these standards? Recent cyber attacks...

Read More