Document Type
Article
Publication Date
8-19-2019
Publication Title
Engineering Reports
Volume
1
Issue Number
1
Abstract
Historically, the boot phase on personal computers left systems in a relatively vulnerable state. Because traditional antivirus software runs within the operating system, the boot environment is difficult to protect from malware. Examples of attacks against bootloaders include so‐called “evil maid” attacks, in which an intruder physically obtains a boot disk to install malicious software for obtaining the password used to encrypt a disk. The password then must be stored and retrieved again through physical access. In this paper, we discuss an attack that borrows concepts from the evil maid. We assume exploitation can be used to infect a bootloader on a system running macOS remotely to install code to steal the user's password. We explore the ability to create a communication channel between the bootloader and the operating system to remotely steal the password for a disk protected by FileVault 2. On a macOS system, this attack has additional implications due to “password forwarding” technology, in which a user's account password also serves as the FileVault password, enabling an additional attack surface through privilege escalation.
Recommended Citation
Armen Boursalian and Mark Stamp. "BootBandit: A macOS bootloader attack" Engineering Reports (2019). https://doi.org/10.1002/eng2.12032
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Comments
This article can also be read online here.