Jump to content

Are the hackintosh (U)EFIs compromised too by CIA-tool "Dark Matter" #Vault7

7 posts in this topic

Recommended Posts


There is no reason to panic


 The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

Share this post

Link to post
Share on other sites

hm wiileaks Tweeted today:

"Darkmatter+Triton can be remotely installed CIA has 2016 version: DerStake2.0 EFI is not fixable "vulnerability" "

Share this post

Link to post
Share on other sites

First these attacks only affect a limited number of Mac models with unupdated firmware that allowed unsigned option roms to be loaded and executed from a thunderbolt device. Second they need physical access to the machine to infect the firmware, the other methods can be done remotely be can also be cleaned, by reinstalling the OS. I imagine there are many more PCs that have this vulnerability as well, in fact one of the reason for the major change to (U)EFI is BIOS firmware rootkits being very prevalent. But, no - Clover can not prevent this because the firmware has already loaded and executed the option rom during pre-initialization boot, before direct execution boot where clover runs.

Share this post

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.