Apple Beefs Up Its Safety Workforce By Hiring Zero-Day Exploit Group

Apple Beefs Up Its Security Team By Hiring Zero-Day Exploit Team

Keep in mind Thunderstrike 2? Final summer time, Xeno Kovah and Trammell Hudson unveiled a critical zero-day vulnerability in OS X letting malware creators utterly brick your Mac with none solution to reset it to its manufacturing unit standing. And it appears like Apple didn’t simply repair the vulnerability — it has additionally employed the group behind this exploit to work on safety.

As a reminder, Thunderstrike 2 contaminated Thunderbolt units like Ethernet adaptors or exterior DVD drives. When you reboot your Mac with an contaminated Thunderbolt system plugged in, the Mac firmware will execute the choice ROM on the Thunderbolt accent earlier than booting OS X. It then bricks the firmware, rendering the Mac unusable.

The perfect half is that the accent stays contaminated, letting somebody bricks as many Macs as they need. It was a strong demo and the workforce alerted Apple has quickly as attainable.

In November 2015, Trammell Hudson revealed that Apple had acquired LegbaCore on the 32C3 convention. Xeno Kovah additionally confirmed that he was working for Apple now:

What did Apple rent us to do? We will’t say. :) Nicely, we will in all probability say one thing like “low degree safety” (I don’t know our job titles)

— Xeno Kovah (@XenoKovah) November 10, 2015

Since then, LegbaCore has stopped accepting new clients for its safety consultancy exercise.

It’s unclear whether or not it’s an acqui-rent or Apple simply employed the 2 individuals behind LegbaCore. In each instances, it seems to be like Kovah and Hudson can’t proceed engaged on LegbaCore and at the moment are working for Apple full time.

And it is sensible that Apple would rent these safety specialists. Many tech corporations rent hackers to repair safety holes earlier than they turn into public. It’s a good way to make it possible for your merchandise stay as safe as potential.

By way of Mac Rumors