However, how far is this true?
For the first time someone had demonstrated a Mac bootkit, i.e.
The malware was one of the dangerous forms because it granted the attacker total control of the Mac computer.
Additionally, the attacker could arbitrarily read or write to the SMRAM region.
Lastly, the attacker could corrupt the platform firmware and cause the system to become inoperable.
Resume scripts is usually re-configures pieces of the hardware which change when they are in low-power state.
Thus one can modify these scripts and ensure the BIOS is left unlocked when the computer restarts.
Next, Thunderstrike attacks the Boot ROM firmware.
Boot ROM firmware:What is this?
When a computer is turned ON, the very first process to run on any machine is Boot ROM.
If Boot ROM is safe, then all the processes launched after this would in turn be safe.
So Boot ROM is one of the most deepest layer of the machine.
A question that arises here is how can one possibly infect the Mac computer at that level!
Hudson, usedOption ROMs(OROMs) to get his hands on the Boot ROM of the Mac computer.
Kovah says: The attacker can just infect the flash chip to start with.
WhenForbesrequested for a comment, Apple did not respond.
Both these can protect a PC from the Thunderstrike 2.
It seems manufacturers of Dell and HP have already enabled these mitigating technologies.
However, Apple has somehow ignored these solutions provided by Intel.
An attacker can use the SpeedRacer bug to brick the Mac by corrupting data or by bypassing the protections.
Sadly, at present this is not offered to an average user.
source: www.techworm.net