{"id":44839,"date":"2015-08-04T08:29:10","date_gmt":"2015-08-04T15:29:10","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=44839"},"modified":"2015-09-04T12:25:25","modified_gmt":"2015-09-04T19:25:25","slug":"thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/","title":{"rendered":"Thunderstrike 2 Firmware Worm Proves Apple Needs a Bug Bounty"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-44842\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-600x300.jpeg\" alt=\"Thunderstrike 2\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>What&#8217;s that? Lightning never strikes in the same place twice?<\/p>\n<p>Well, sometimes it does \u2014\u00a0and this time it&#8217;s just become much more dangerous.<\/p>\n<p>Earlier this year, we described how Apple had patched a serious security hole in OS X called <a title=\"OS X 10.10.2 Update Released \u2013 Fixing Thunderstrike and other Security Vulnerabilities\" href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-10-10-2-update-released-fixing-thunderstrike-and-other-security-vulnerabilities\/\" target=\"_blank\">&#8220;Thunderstrike.&#8221;<\/a><\/p>\n<p>What made Thunderstrike so nasty was that it could install malware onto your computer&#8217;s firmware \u2014\u00a0specifically the ROM EFI boot chip \u2014 and once in place could turn itself &#8220;invisible,&#8221; making it impossible to detect through anti-virus software, because of the extremely low level it was running at.<\/p>\n<p>Once in place, malware could spy on you or steal information \u2014\u00a0and it was even capable of fending off removal attempts using firmware-flashing software.<\/p>\n<p>The only silver lining on Thunderstrike&#8217;s cloud was that an attacker needed to infect your Mac, by plugging a boobytrapped Thunderbolt device into your Mac or Macbook\u00a0\u2014 without physical access, the attacker wouldn&#8217;t be able to infect you.<\/p>\n<p>Well, that was then and this is now.<\/p>\n<p>With the newly unveiled Thunderstrike 2, things have taken a dramatic turn.<\/p>\n<p>Trammell Hudson, the researcher who first revealed details of the original Thunderstrike, has teamed up with Xeno Kovah, to reveal a way in which a Mac&#8217;s firmware can be infected without physical access, from anywhere on the planet.<\/p>\n<p>As <em>Wired<\/em> <a title=\"Link to Wired report\" href=\"http:\/\/www.wired.com\/2015\/08\/researchers-create-first-firmware-worm-attacks-macs\/\" target=\"_blank\" rel=\"nofollow\">reports<\/a>, researchers have even developed a proof-of-concept worm that allows the firmware attack to spread automatically between Macbooks, even if they are not networked to each other.<\/p>\n<blockquote><p>The attack raises the stakes considerably for system defenders since it would allow someone to remotely target machines\u2014including air-gapped ones\u2014in a way that wouldn\u2019t be detected by security scanners and would give an attacker a persistent foothold on a system even through firmware and operating system updates.<\/p><\/blockquote>\n<p>You can see the Thunderstrike 2 firmworm in action in the following <a title=\"Link to YouTube video\" href=\"https:\/\/www.youtube.com\/watch?v=Jsdqom01XzY&amp;rel=0\" target=\"_blank\" rel=\"nofollow\">YouTube video<\/a>:<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/Jsdqom01XzY?version=3&#038;rel=0&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>The means to build a firmworm like this are certainly not within the capability of many attackers, but nonetheless it&#8217;s clearly important that Apple patches the security holes that allow such attacks to take place at the earliest possible opportunity \u2014\u00a0before a malicious attacker tries to take advantage of them.<\/p>\n<p>There are some very smart people out there who are very good at finding vulnerabilities in Apple&#8217;s software.<\/p>\n<p>The good news is that some of them aren&#8217;t in the business of exploiting the vulnerabilities for criminal commercial gain, and aren&#8217;t in the pocket of foreign governments and intelligence agencies.<\/p>\n<p>Some of them genuinely want to improve security, and believe they are performing a valuable service by raising awareness of security vulnerabilities that really should be fixed.<\/p>\n<p>Sure, some of these security researchers quite enjoy the limelight, and like to show off how clever they have been, and some of them might have very <a title=\"Apple Criticised for Not Patching OS X Yosemite Zero-Day Vulnerability\" href=\"https:\/\/www.intego.com\/mac-security-blog\/yosemite-zero-day\/\" target=\"_blank\">strongly held views<\/a> about the quality of code being written in Cupertino, and Apple&#8217;s tardiness in patching.<\/p>\n<p>But none of that matters to the millions of Mac and Macbook users around the world. They simply want to know that their systems are secure and not at risk. Apple has tried to close the security holes exploited in these firmware attacks in the past, and yet researchers keep finding more vulnerabilities.<\/p>\n<p>The really bad news is that Apple isn&#8217;t doing enough to work with these researchers, and could be doing much more to ensure that their discoveries are only made public when a fix is available.<\/p>\n<p>Other technology companies are offering sizeable bug bounties to researchers who work with them to uncover security holes, whereas Apple \u2014\u00a0one of the richest companies in the world \u2014\u00a0doesn&#8217;t even bother to dangle the carrot of a $10 iTunes voucher, preferring to name bug reporters on a <a title=\"LInk to Apple bug hall of fame\" href=\"https:\/\/support.apple.com\/en-au\/HT201536\" target=\"_blank\" rel=\"nofollow\">&#8220;hall of fame&#8221; page<\/a> instead.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another serious vulnerability has been found at the heart of Macs and MacBooks, and could be exploited by an undetectable firmware worm.<\/p>\n<p>Shouldn&#8217;t Apple be doing more to encourage vulnerability research?<\/p>\n","protected":false},"author":34,"featured_media":44851,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,13,5],"tags":[1891,2404,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Another serious vulnerability has been found at the heart of Macs and MacBooks, and could be exploited by an undetectable firmware worm.  Shouldn&#039;t Apple be doing more to encourage vulnerability research?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Thunderstrike 2 Firmware Worm Proves Apple Needs a Bug Bounty - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Another serious vulnerability has been found at the heart of Macs and MacBooks, and could be exploited by an undetectable firmware worm.  Shouldn&#039;t Apple be doing more to encourage vulnerability research?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-04T15:29:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-09-04T19:25:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/\",\"name\":\"Thunderstrike 2 Firmware Worm Proves Apple Needs a Bug Bounty - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#primaryimage\"},\"datePublished\":\"2015-08-04T15:29:10+00:00\",\"dateModified\":\"2015-09-04T19:25:25+00:00\",\"description\":\"Another serious vulnerability has been found at the heart of Macs and MacBooks, and could be exploited by an undetectable firmware worm. Shouldn't Apple be doing more to encourage vulnerability research?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Thunderstrike 2 Firmware Worm Proves Apple Needs a Bug Bounty\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Thunderstrike 2 Firmware Worm Proves Apple Needs a Bug Bounty\",\"datePublished\":\"2015-08-04T15:29:10+00:00\",\"dateModified\":\"2015-09-04T19:25:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#webpage\"},\"wordCount\":626,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-400x260.jpeg\",\"keywords\":[\"Thunderstrike\",\"Thunderstrike 2\",\"Vulnerability\"],\"articleSection\":[\"Malware\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Another serious vulnerability has been found at the heart of Macs and MacBooks, and could be exploited by an undetectable firmware worm.  Shouldn't Apple be doing more to encourage vulnerability research?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/","og_locale":"en_US","og_type":"article","og_title":"Thunderstrike 2 Firmware Worm Proves Apple Needs a Bug Bounty - The Mac Security Blog","og_description":"Another serious vulnerability has been found at the heart of Macs and MacBooks, and could be exploited by an undetectable firmware worm.  Shouldn't Apple be doing more to encourage vulnerability research?","og_url":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-08-04T15:29:10+00:00","article_modified_time":"2015-09-04T19:25:25+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/","name":"Thunderstrike 2 Firmware Worm Proves Apple Needs a Bug Bounty - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#primaryimage"},"datePublished":"2015-08-04T15:29:10+00:00","dateModified":"2015-09-04T19:25:25+00:00","description":"Another serious vulnerability has been found at the heart of Macs and MacBooks, and could be exploited by an undetectable firmware worm. Shouldn't Apple be doing more to encourage vulnerability research?","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Thunderstrike 2 Firmware Worm Proves Apple Needs a Bug Bounty"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Thunderstrike 2 Firmware Worm Proves Apple Needs a Bug Bounty","datePublished":"2015-08-04T15:29:10+00:00","dateModified":"2015-09-04T19:25:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#webpage"},"wordCount":626,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-400x260.jpeg","keywords":["Thunderstrike","Thunderstrike 2","Vulnerability"],"articleSection":["Malware","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/thunderstrike-2-firmware-worm-proves-apple-needs-a-bug-bounty\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/08\/thunder2-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-bFd","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/44839"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=44839"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/44839\/revisions"}],"predecessor-version":[{"id":45976,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/44839\/revisions\/45976"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/44851"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=44839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=44839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=44839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}