Intel Security, in response, has released a new tool for making sure your MacBook isn’t vulnerable to one of the many exposed techniques. According to the tranche of documents, the CIA had developed an EFI (Extensible Firmware Interface) rootkit for MacBooks. The rootkit, called DarkMatter, would replace the BIOS on a MacBook and run malicious code. Rootkits are pretty advanced pieces of malware, designed to avoid detection.
Inter Security, which will be rebranded under the McAfee name once again soon, published the scanner to help users identify if they are affected. The scanner is a module for CHIPSEC, Intel’s framework for analyzing PC security.
“EFI firmware malware is a new frontier for stealth and persistent attacks that may be used by sophisticated adversaries to penetrate and persist within organizations and national infrastructure for a very long time. Use open-source CHIPSEC to defend from this threat and stay safe,” said the company.
The update from Intel comes just a couple of days after Apple issued a note to users stating that it has resolved many of the bugs and vulnerabilities that had emerged from the CIA document dump. Intel’s move will provide another fix to the wide array of issues that have cropped up since WikiLeaks published the data.
The whistleblower organization added later in the week that it would not publish details about the CIA’s zero-days — bugs that have yet to be discovered by the software’s developers — until it has alerted the developers to patch the bug, thus providing at least a little more protection for users.
Editors' Recommendations
- I’m finally ready to stop recommending Apple’s cheapest MacBook
- 5 things you need to know before buying a new MacBook Pro
- Steve Jobs killed this MacBook feature 15 years ago. Now it might be back
- A major era in MacBook history is finally over
- Here’s more proof that Apple is wrong about MacBook memory