By actually combining two different exploits that were initially developed in order to jailbreak iPhones, certain security researchers have claimed that they can also use this to jailbreak both Macs and MacBook devices which include Apple's very own latest line of the known T2 security chips.

If this jailbreak is exploited correctly, it will allow certain users/attackers to get full control over their own devices in order to modify the core OS behavior or even be used in order to retrieve certain sensitive and encrypted data. It can even be used to plant certain types of malware.

Apple's very own T2 security chip

The T2 is known as a special type of co-processor that is initially installed alongside the very main Intel CPU on the modern Apple desktops naimly the MAc Pro, iMac, Mac mini and also the MacBooks. The T2 chips were previously announced back in 2017 and started with all the Apple devices that were sold back in 2018.

They are used as a particularly separate CPU, also known to some as the co-processor. By default, they actually handle the audio processing and also various low-level I/O functions just in order to help lift a few loads off of the main CPU.

However, they actually also serve as a sort of security chip, as the known Secure Enclave Processor, that is used to process sensitive data just like KeyChain passowrds, cryptographic operations, TouchID authentication, and also the device's very own encrypted storage and other secure boot capabilities.

The attack uses two different exploits

The attack actually requires combining two different exploits that were originally designed for jailbreaking the iOS devices named both Blackbird and Checkm8. The jailbreak works by connecting to either a Mac or Macbook using the USB-C and also the running version 0.11.0 of the whole Checkra1n jailbreaking software right during the Mac's own boot-up process.

The process allows the attacker to get the root access on the whole T2 chip and also modify and eventually take control of just about anything running on the whole targeted device, even trying to recover certain encrypted data.

Read Also: SpaceX's 'Cleverly Engineered' Starlink Satellites Could Improve US Military Communications Against Potential Threats: Air Force Acquisition Chief is Impressed

Apple users are in danger

Obviously this poses a threat to Apple users since anyone can hack into their device just by using a USB type C cable and can easily reboot the device then later on run it through Checkra1n 0.11.0.

The news isn't actually that good for certain travelers during the whole security checks at the border crossings or even for enterprises that employ such a large fleet of both MacBook notepads and Macs, all of which are actually now exposed to the attacks and have their secrets pilfered in such classic evil maid attacks.

Read Also: Apple Buys 'Counter-Spotify' Startup That Helps Them Tap Into the Podcast Industry

This article is owned by Tech Times

Written by Urian Buenconsejo

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Tags: Apple Mac MacBook
Join the Discussion