Casa > cibernético Notícias > 5 MacOS vulnerabilidades que não deve ser negligenciado

5 MacOS vulnerabilidades que não deve ser negligenciado

MacOS é acreditado geralmente para ser à prova de balas contra ataques de malware. Infelizmente, as estatísticas revelam um quadro diferente onde o sistema operacional da Apple é encontrado frequentemente vulneráveis. Por exemplo, no 2017 pesquisadores de segurança detectou um aumento de 28.83 percent of total reported security flaws in comparison with 2016.

And even though the total number of vulnerabilities is lower in 2018 than in the two previous years, the number of active malware campaigns against Macs is growing. Macs are frequently endangered by potentially unwanted programs such as [wplinkpreview url =””]Similar Foto Cleaner e [wplinkpreview url =””]Mac Auto Fixer that slow down their overall performance and compromise their privacy. But Macs are also targeted by far [wplinkpreview url =””]more serious malicious campaigns that drop Trojans like OSX.Calisto and worms like Backdoor:OSX / Iworm.

Why is it crucial to pay attention to the vulnerabilities in macOS, and Apple’s software in general? If vulnerabilities have been exposed in any operating system, the system becomes susceptible to malware attacks. And as it turns out, macOS is not an exclusion and does contain security flaws.

Code Execution Vulnerabilities

Let’s take code execution vulnerabilities that have been increasing in macOS – they can be triggered remotely and can be used in various malicious scenarios. This type of security flaw is favored by threat actors because it allows them to bypass authentication and run any type of code. This can happen covertly, sem o conhecimento do usuário.

Such a vulnerability was discovered in Xcode for macOS High Sierra in June this year. não é de surpreender, the flaw could allow for arbitrary code execution, avisou CIS security researchers.

What is Xcode? It is an integrated development environment that contains a suite of software development tools created by Apple. Em caso de exploração, this vulnerability could lead to arbitrary code execution within the application. Como um resultado, the attacker could gain the same privileges as the logged-in user. Security restrictions could also be bypassed easily. Depending on the level of privileges, o invasor pode instalar programas, tamper with data on the device, and create new accounts with full user rights.

Data Theft Vulnerabilities

Security firm F-Secure recently unveiled a dangerous firmware exploit that affected almost all Mac and Windows laptops and desktop computers. This vulnerability could lead to data theft, and even left Macs with FileVault turned on susceptible, TechCrunch informou.

The firmware exploit stemmed from the way almost any Mac or Windows machine overwrite data when they are turned off. The vulnerability was based on the so-called cold boot attack where threat actors could harvest data from a turned-off computer.

The issue was discovered by F-Secure researchers Olle Segerdahl and Pasi Saarinen. Even though the vulnerability required physical access to leverage it, não deve ser esquecido. Pelo menos, this exploit shows that both Microsoft and Apple’s operating systems have similar problems, despite the widely marketed belief that one is more secure than the other.

MacOS Zero-Day Vulnerabilities

em agosto, 2018, the well-known security researcher Patrick Wardle uncovered a zero-day in Apple software just by altering a few lines of code. A demonstration during the Defcon conference in Las Vegas showed that this vulnerability can be easily used by threat actors in malware operations. The vulnerability is classified as a shortcoming of the operating system’s design and tracked in the CVE-2017-7150 advisory.

The zero-day is triggered by abusing the user interface via a novel technique that generates “synthetic clicks” emulating user behaviour. This allows threat actors to automatically bypass notification and warning prompts by fooling the system.

Instead of emulating mouse movement itself (which has already been used in previous malware), this technique relies on a feature called mouse keys, which converts keyboard interaction into mouse actions. This is triggered by pressing specific keys on the keyboard which in turn are interpreted by the operating system as mouse presses, and accepted as regular user movements thus passing through security alerts.

Here’s the official description of the vulnerability:

An issue was discovered in certain Apple products. macOS before 10.13 Supplemental Update is affected. The issue involves the “Security” component. It allows attackers to bypass the keychain access prompt, and consequently extract passwords, via a synthetic click.

Denial-of-service Vulnerabilities

Multiple security vulnerabilities were reported in Apple macOS/OS X in June 2018. As explained in the alerta de segurança, “an issue was discovered in certain Apple products. iOS before 11.4 é afetado. macOS before 10.13.5 é afetado. tvOS before 11.4 é afetado. watchOS before 4.3.1 is affected”.

It appears that the issues involve the pktmnglr_ipfilter_input in in the “Núcleo” componente. A remote attacker could be able to execute arbitrary code in a privileged content or cause a denial-of-service condition with the help of a specially crafted app. Security restrictions could also be bypassed.

It should be noted that the security score for this set of flaws is quite high – 9.3.

Kernel Level Memory Corruption Vulnerabilities

Just last month Trustwave SpiderLabs security researchers uncovered a Webroot SecureAnywhere vulnerability that could allow threat actors to run malicious code in local kernel mode code. The vulnerability is assigned the CVE-2018-16962 advisory and is dubbed “Webroot SecureAnywhere macOS Kernel Level Memory Corruption.”

Em termos técnicos, the vulnerability arms a threat actor with a write-what-where kernel gadget with the caveat that the original value of the memory referenced by the pointer must be equal to (int) -1, Trustwave explicado.

The vulnerability was local, meaning that attacks had to be based on executing malicious code on the system, or social engineering tactics had to be deployed to trick users into running the exploit. This makes the exploit more complex and time-consuming for attackers, but it still is a potential threat to macOS users.

Milena Dimitrova

Um escritor inspirado e gerente de conteúdo que está com SensorsTechForum desde o início do projeto. Um profissional com 10+ anos de experiência na criação de conteúdo envolvente. Focada na privacidade do usuário e desenvolvimento de malware, ela acredita fortemente em um mundo onde a segurança cibernética desempenha um papel central. Se o senso comum não faz sentido, ela vai estar lá para tomar notas. Essas notas podem mais tarde se transformar em artigos! Siga Milena @Milenyim

mais Posts

Me siga:

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

Compartilhar no Facebook Compartilhar
Compartilhar no Twitter chilrear
Compartilhar no Google Plus Compartilhar
Partilhar no Linkedin Compartilhar
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Partilhar no StumbleUpon Compartilhar