Andy Greenberg
 
Apple Laptops Vulnerable To Hack That Kills Or Corrupts Batteries

Jul. 22 2011 - 12:56 pm | 2,711 views | 0 recommendations | 1 comment

http://blogs.forbes.com/andygreenberg/2011/07/22/apple-laptops-vulnerable-to-hack-that-kills-or-corrupts-batteries/

A pile of dead Apple laptop batteries, victims of Charlie Miller's research.

Your laptop’s battery is smarter than it looks. And if a hacker like security 
researcher Charlie Miller gets his digital hands on it, it could become more 
evil than it appears, too.

At the Black Hat security conference in August, Miller plans to expose and 
provide a fix for a new breed of attack on Apple laptops that takes advantage 
of a little-studied weak point in their security: the chips that control their 
batteries.

Modern laptop batteries contain a microcontroller that monitors the power level 
of the unit, allowing the operating system and the charger to check on the 
battery’s charge and respond accordingly. That embedded chip means the lithium 
ion batteries can know when to stop charging even when the computer is powered 
off, and can regulate their own heat for safety purposes.

When Miller examined those batteries in several Macbooks, Macbook Pros and 
Macbook Airs, however, he found a disturbing vulnerability. The batteries’ 
chips are shipped with default passwords, such that anyone who discovers that 
password and learns to control the chips’ firmware can potentially hijack them 
to do anything the hacker wants. That includes permanently ruining batteries at 
will, and may enable nastier tricks like implanting them with hidden malware 
that infects the computer no matter how many times software is reinstalled or 
even potentially causing the batteries to heat up, catch fire or explode. 
“These batteries just aren’t designed with the idea that people will mess with 
them,” Miller says. “What I’m showing is that it’s possible to use them to do 
something really bad.”

Miller discovered the two passwords used to access and alter Apple batteries by 
pulling apart and analyzing a 2009 software update that Apple instituted to fix 
a problem with Macbook batteries. Using those keys, he was soon able to reverse 
engineer the chip’s firmware and cause it to give whatever readings he wanted 
to the operating system and charger, or even rewrite the firmware completely to 
do his bidding.

>From there, zapping the battery such that it’s no longer recognized by the 
>computer becomes trivial: In fact, Miller permanently “bricked” seven 
>batteries just in the course of his tinkering. (They cost about $130 to 
>replace.) More interesting from a criminal perspective, he suggests, might be 
>installing persistent malware on the chip that infects the rest of the 
>computer to steal data, control its functions, or cause it to crash. Few IT 
>administrators would think to check a battery’s firmware for the source of 
>that infection, and if undiscovered the chip could re-infect the computer 
>again and again.

“You could put a whole hard drive in, reinstall the software, flash the BIOS, 
and every time it would reattack and screw you over. There would be no way to 
eradicate or detect it other than removing the battery.” says Miller.

That attack would require finding another vulnerability in the interface 
between the chip and the operating system. But Miller says that’s not much of a 
barrier. “Presumably Apple has never considered that as an attack vector, so 
it’s very possible it’s vulnerable.”

And the truly disturbing prospect of a hacker remotely blowing up a battery on 
command? Miller didn’t attempt that violent trick, but believes it might be 
possible. “I work out of my home, so I wasn’t super inclined to cause an 
explosion there,” he says.

In fact, the batteries he examined have other safeguards against explosions: 
fuses that contain an alloy that melts at high temperatures to break the 
circuit and prevent further charging. But Miller, who has worked for the 
National Security Agency and subsequently hacked everything from the iPhone to 
virtual worlds, believes it might still be possible. “You read stories about 
batteries in electronic devices that blow up without any interference,” he 
says. “If you have all this control, you can probably do it.”

Miller, currently a researcher with the consultancy Accuvant, isn’t the first 
to explore the danger of explosive batteries triggered by hackers. Barnaby 
Jack, a researcher for with antivirus giant McAfee, says he worked on the 
problem in 2009, but he says he ”benched the research when I didn’t succeed in 
causing any lithium ion fires. Charlie has taken it a lot further and surpassed 
where I was at the time.”

Miller says he’s received messages from several other researchers asking him 
not proceed with the battery work because it could be too dangerous. But Miller 
has worked to fix the problems he’s exposing. At Black Hat he plans to release 
a tool for Apple users called “Caulkgun” that changes their battery firmware’s 
passwords to a random string, preventing the default password attack he used. 
Miller also sent Apple and Texas Instruments his research to make them aware of 
the vulnerability. I contacted Apple for comment but haven’t yet heard back 
from the company.

Implementing Miller’s “Caulkgun” prevents any other hacker from using the 
vulnerabilities he’s found. But it would also prevent Apple from using the 
battery’s default passwords to implement their own upgrades and fixes. Those 
who fear the possibilities of a hijacked chunk of charged chemicals in their 
laps might want to consider the tradeoff.

“No one has ever thought of this as a security boundary,” says Miller. “It’s 
hard to know for sure everything someone could do with this.”
_______________________________________________
Infowarrior mailing list
[email protected]
https://attrition.org/mailman/listinfo/infowarrior

Reply via email to