Apple MacBooks, Wintel Notebooks Vulnerable To Wireless Attack
Plans by two hackers to demonstrate wireless vulnerabilities at the Black Hat Conference shoot "a pretty big hole in the 'bulletproof' image Apple is trying to project," according to the SANS Institute.
Wireless device drivers for computers running both Apple Computer and Microsoft operating systems appear to be full of holes, and a prominent security researcher recommends turning off wireless cards until the holes can be fixed.
Last night, Intel and the SANS Internet Storm Center announced three Centrino vulnerabilities that can also be used to take over computers using Centrino-based wireless cards.
Introduced in 2003 by Intel, the Centrino package consists of the CPU chip, chipset, and wireless network module.
On Wednesday afternoon at the Black Hat computer security conference in Las Vegas, hackers Jon "Johnny Cache" Ellch and Dave Maynor plan to demonstrate how to take over any Apple MacBook if its wireless card is turned on, even if the owner isn't connected to a wireless network.
In an e-mail to the SANS mailing list and government security researchers, SANS Institute Director Alan Paller warns, "This is a big story for several reasons. First it shoots a pretty big hole in the 'bulletproof' image Apple is trying to project (notice the words Maynor used in the Krebs interview). Second, it isn't just about Macs. The vulnerabilities apparently can also be found in Centrino-based laptops as well. Third, by nature, attackers (a.k.a. security researchers) are swarm organisms. That means they will see Maynor's work as a beacon to follow toward a new cache of useful vulnerabilities. And finally, the really bad guys are already using these flaws (and are frustrated that Maynor is making them public)."
An Apple spokesperson says the company is looking into the issue.
Intel has released driver security updates for Centrino device drivers for Windows and for the Intel PROSet management software.
Until a patch has been applied, consider unwiring your wireless. "[P]atching the Centrino flaws and turning off wireless cards is indicated as an immediate response," Paller recommends. Firewalls are unlikely to help because they're not designed to filter low-level wireless device communication.
The Washington Post's Brian Krebs, who broke this story, reports that Apple and Microsoft are working with wireless card vendors and original equipment manufacturers to remedy the problems.
It's not immediately clear how easy it will be to get these fixes into the hands of notebook computer users.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.