Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Physical malware—what is it, exactly?

I just bought a used 2010 white MacBook from ebay. Then came across this detailed, informative thread regarding malware—https://discussions.apple.com/thread/5752757


I noticed that if someone has physical access to your computer, then they can install hardware-based… malware? Not sure what the proper term is.


Even though I have no reason to suspect the previous owner of anything at all, I'm curious about this now. And since I haven't put anything on the hard drive yet, am willing to do a fresh install of OS X, or anything else you guys recommend that could protect against anything, whether keyloggers or other malware. One reason I got this laptop was so I could run TurboTax and online banking, but now a little reluctant about dealing with sensitive information until I know more.


Questions—

1. What are some examples of this physical ~malware that I could be up against? I read a little about keyloggers, but not sure what else is even out there.

2. What can I do to get rid of this malware, if there even is any?

3. Can malware (physical or otherwise) get into the firmware, in which case even erasing or replacing the hard drive wouldn't help?


Not knowledgable about this stuff (clearly), although I've done minor surgery following iFixit and similar guides in the past. Which only helps if there's something to take apart here, I realize. So if you wouldn't mind pointing me in the right direction, I would appreciate it. Thanks!

MacBook, OS X Yosemite (10.10), 2010

Posted on Mar 30, 2015 10:56 PM

Reply
Question marked as Best reply

Posted on Mar 31, 2015 12:40 AM

When you buy a used computer, the first thing to do is run the system utilities

from the install-restore DVD media or from Recovery (or online utilities if none)

or buy replacement DVDs for the computer (last system on DVD 10.6.3) if it

had any, from Apple... And totally secure erase, reformat and reinstall a new

OS X system into the computer, which would resolve older items stored there.


•Tech Guides:

http://www.thesafemac.com/tech-guides/


That also gets rid of the former user content. However be sure to correctly identify

the computer before you invest in update and upgrade in hardware & system OS X.


Good luck & happy computing! 🙂

6 replies
Question marked as Best reply

Mar 31, 2015 12:40 AM in response to egg151

When you buy a used computer, the first thing to do is run the system utilities

from the install-restore DVD media or from Recovery (or online utilities if none)

or buy replacement DVDs for the computer (last system on DVD 10.6.3) if it

had any, from Apple... And totally secure erase, reformat and reinstall a new

OS X system into the computer, which would resolve older items stored there.


•Tech Guides:

http://www.thesafemac.com/tech-guides/


That also gets rid of the former user content. However be sure to correctly identify

the computer before you invest in update and upgrade in hardware & system OS X.


Good luck & happy computing! 🙂

Apr 1, 2015 11:03 PM in response to egg151

Thanks, K Shaffer—the recovery DVDs are supposed to arrive in the next day or so. The seller already wiped the hard drive and did a fresh install of Yosemite, but your idea sounds good. Regarding Tech Guides, I remember seeing that page, and somewhere on that site found a guide for what to do when you're selling a Mac, but hadn't looked around enough to find what to do when you buy one. I do have to read more there, about malware, etc.


Also thanks, LexSchellings—and are you referring to Thunderstrike, or something else? I wasn't sure if that would apply to me, since the computer doesn't have a Thunderbolt port, although maybe that's irrelevant. I don't have time to read the link you sent right now, but marked it for later. Thanks, it looks like it'll be full of information on firmware, which is something I definitely don't understand well yet.


I'm still looking for more information on what malware could be installed if someone has had physical access, and what I can do about it. Once I find the old posts where people mentioned this, I'll more details here, and hopefully that might help you guys understand what I'm trying to describe. Thanks!

Apr 1, 2015 11:54 PM in response to egg151

There are said to be more possibilities to infect firmware/hardware:

Thunderstrike is one of them. There are also hacked routers seen and thunderbolt screens, and such. it is relatively new. In general I concluded that for Mac it seems to be very unlikely that one gets infected.

Of course all sorts of malware can be installed by someone who has physical access. But most of the time that it gets on a computer because the owner installs it (unknowingly) him self: If you download softwares with a torrent downloader, first of all the torrent downloader app is not safe and could have a connection to malware, but more often the software that is downloaded has malware built in in the installer of that software, for example you download Photoshop that is stolen or hacked with a key generator, and while installing there gets malware on your computer. This is common practice. That is why I always propose to get rid of uTorrent, bittorrent and so on, and uninstall the so downloaded software, then do a scan with ClamXav, and run Adwaremedic.

Lex

Apr 2, 2015 1:11 PM in response to egg151

egg151 wrote:


1. What are some examples of this physical ~malware that I could be up against? I read a little about keyloggers, but not sure what else is even out there.


There are two things I can think of that could be referred to as "physical malware." One is malware installed into the firmware. This is difficult to do, but an experienced and knowledgeable hacker can sometimes figure out how to do it given physical access. Thunderstrike is an example, though the vulnerability has been closed, and I'm not aware of any other way to do the equivalent on a modern Mac. That doesn't mean that it's impossible for other methods to exist, but it's unlikely a Mac purchased on eBay would have this done to it. It would be too much work to aim at a random target.


The other is to actually make some kind of physical modifications to the hardware of the computer for malicious purposes. This is something that only a very knowledgeable hardware hacker would be able to do, and the work and expense would be unlikely to be worthwhile for a Mac that was going to be sold to a random stranger on eBay.


In all, it's very unlikely that you have to worry about this... but nobody can say the chances are zero. I'd say, for all practical purposes, though, that you could consider it to be zero.


2. What can I do to get rid of this malware, if there even is any?


For the malicious modifications described above, the only solution may be to replace the machine.


When it comes to the more likely conventional "software" malware, the only reliable way to be rid of it is to erase the hard drive and reinstall everything from scratch. This is one reason why this is the first thing you should do with any machine bought second-hand. Regardless of what the seller says he/she has done with the machine, you should always erase a used Mac's hard drive before you begin using it.

Physical malware—what is it, exactly?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.