Apple Safari is not as secure as you think

Powered by SC Magazine
 

`Secure' online banking and payment credential pages accessible to hackers

The IT security reputation of the Apple Mac as being impervious to malware/hacker attacks ratcheted down a few more notches this week after Kaspersky Lab revealed that a potentially serious loophole has been discovered in the Safari Web browser.

According to Vyacheslav Zakorzhevsky, head of vulnerability research with Kaspersky, an unencrypted file used to restore a previous browsing session in the Web browser client gives attackers direct access to the sites that the Internet user has visited.

This is particularly important when users are visiting a secure Web site - such as online banking logins or making an online payment -  an `https' Web page is not normally accessible using the `browser back' button, and for good reason, SCMagazineUK.com notes.

Zakorzhevsky, who has been with Kaspersky since 2007, says that Safari does not encrypt previous sessions and stores them in a standard plist file that is freely accessible.

"As a result, it's easy to find a user's login credentials," he said, adding that, because a complete Web session on a given site is saved in the plist file, it becomes accessible, despite the use of `https' technology.

Whilst the log file is located in a hidden folder, this folder is available for anyone to read, he explained.

Zakorzhevsky went on to say that Kaspersky has told Apple about the problem, noting that: "At the current time we can't confirm whether or not there is malicious code out there that targets this file, but we're ready to bet that it won't be long before it appears."

The loophole is made potentially worse, as a sizeable number of Apple Mac users remain under the impression that the OSX operating system is relatively immune to security problems, despite the fact that a growing number of vulnerabilities have been spotted in the last few years.

Because of this, if a hacker were to use this attack vector to insert malware into the Apple OSX-based host machine, there is a strong chance they will have no security to defend that platform against data exfiltration and complete system compromise.

Gabi Reish, head of product management at Check Point Software Technologies, told SCMagazineUK.com that it is not just cybercriminals that companies need to be concerned about, but also industrial espionage attacks.

“Many years ago the attacks were mainly mischievous, but now we have cybercriminality and industrial espionage to worry about," he said, adding that the so-called APT1 attack from China in February of this year was a classic example of this.

According to Mandiant's APT1 report of the time, the APT1 attacks were traced to the 2nd Bureau of the Chinese People's Liberation Army (PLA) General Staff Department's (GSD) 3rd Department – aka Unit 61398.

Kaspersky's revelations come just weeks after Google announced it was paying a US$ 17 million (£10.5 million) penalty to 37 US states and the District of Columbia to compensate for tapping the Doubleclick advertising network to surveil Safari user's Web browsing sessions back in 2011 and 2012.

In July of this year, a report from NSS Labs rated Apple's Safari browser as inferior to Google Chrome and Internet Explorer in terms of blocking malware.

The `Browser Security Comparative Analysis' report - authored by Randy Abrams and Jayendra Pathak of NSS Labs - said that, of all the browsers, Apple's Safari has the most obscure `Do Not Track' setting, as well as criticising Safari's approach to geo-location.

"Safari enables geo-location services by default, and its users are prompted when a site requests location services," said the NSS Labs report.

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, UK edition


Apple Safari is not as secure as you think
 
 
 
Top Stories
Frugality as a service: the Amazon story
Behind the scenes, Amazon Web Services is one lean machine.
 
Negotiating with the cloud email megavendors
[Blog post] Lessons from Woolworths’ mammoth migration.
 
Qld govt to move up to 149k staff onto Office 365
Australia's largest deployment, outside of the universities.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...

Latest VideosSee all videos »

The great data centre opportunity on Australia's doorstep
The great data centre opportunity on Australia's doorstep
Scott Noteboom, CEO of LitBit speaking at The Australian Data Centre Strategy Summit 2014 in the Gold Coast, Queensland, Australia. http://bit.ly/1qpxVfV Scott Noteboom is a data centre engineer who led builds for Apple and Yahoo in the earliest days of the cloud, and who now eyes Asia as the next big opportunity. Read more: http://www.itnews.com.au/News/372482,how-do-we-serve-three-billion-new-internet-users.aspx#ixzz2yNLmMG5C
Interview: Karl Maftoum, CIO, ACMA
Interview: Karl Maftoum, CIO, ACMA
To COTS or not to COTS? iTnews asks Karl Maftoum, CIO of the ACMA, at the CIO Strategy Summit.
Susan Sly: What is the Role of the CIO?
Susan Sly: What is the Role of the CIO?
AEMO chief information officer Susan Sly calls for more collaboration among Australia's technology leaders at the CIO Strategy Summit.
Meet the 2014 Finance CIO of the Year
Meet the 2014 Finance CIO of the Year
Credit Union Australia's David Gee awarded Finance CIO of the Year at the iTnews Benchmark Awards.
Meet the 2014 Retail CIO of the Year
Meet the 2014 Retail CIO of the Year
Damon Rees named Retail CIO of the Year at the iTnews Benchmark Awards for his work at Woolworths.
Robyn Elliott named the 2014 Utilities CIO of the Year
Robyn Elliott named the 2014 Utilities CIO of the Year
Acting Foxtel CIO David Marks accepts an iTnews Benchmark Award on behalf of Robyn Elliott.
Meet the 2014 Industrial CIO of the Year
Meet the 2014 Industrial CIO of the Year
Sanjay Mehta named Industrial CIO of the Year at the iTnews Benchmark Awards for his work at ConocoPhillips.
Meet the 2014 Healthcare CIO of the Year
Meet the 2014 Healthcare CIO of the Year
Greg Wells named Healthcare CIO of the Year at the iTnews Benchmark Awards for his work at NSW Health.
Meet the 2014 Education CIO of the Year
Meet the 2014 Education CIO of the Year
William Confalonieri named Healthcare CIO of the Year at the iTnews Benchmark Awards for his work at Deakin University.
Meet the 2014 Government CIO of the Year
Meet the 2014 Government CIO of the Year
David Johnson named Government CIO of the Year at the iTnews Benchmark Awards for his work at the Queensland Police Service.
Q and A: Coalition Broadband Policy
Q and A: Coalition Broadband Policy
Malcolm Turnbull and Tony Abbott discuss the Coalition's broadband policy with the press.
AFP scalps hacker 'leader' inside Australia's IT ranks.
AFP scalps hacker 'leader' inside Australia's IT ranks.
The Australian Federal Police have arrested a Sydney-based IT security professional for hacking a government website.
NBN Petition Delivered To Turnbull's Office
NBN Petition Delivered To Turnbull's Office
UTS CIO: IT teams of the future
UTS CIO: IT teams of the future
UTS CIO Chrissy Burns talks data.
New UTS Building: the IT within
New UTS Building: the IT within
The IT behind tomorrow's universities.
iTnews' NBN Panel
iTnews' NBN Panel
Is your enterprise NBN-ready?
Introducing iTnews Labs
Introducing iTnews Labs
See a timelapse of the iTnews labs being unboxed, set up and switched on! iTnews will produce independent testing of the latest enterprise software to hit the market after installing a purpose-built test lab in Sydney. Watch the installation of two DL380p servers, two HP StoreVirtual 4330 storage arrays and two HP ProCurve 2920 switches.
The True Cost of BYOD
The True Cost of BYOD
iTnews' Brett Winterford gives attendees of the first 'Touch Tomorrow' event in Brisbane a brief look at his research into enterprise mobility. What are the use cases and how can they be quantified? What price should you expect to pay for securing mobile access to corporate applications? What's coming around the corner?
Ghost clouds
Ghost clouds
ACMA chair Chris Chapman says there is uncertainty over whether certain classes of cloud service providers are caught by regulations.
Was the Snowden leak inevitable?
Was the Snowden leak inevitable?
Privacy experts David Vaile (UNSW Cyberspace Law and Policy Centre) and Craig Scroggie (CEO, NextDC) claim they were not surprised by the Snowden leaks about the NSA's PRISM program.
Latest Comments
Polls
Which bank is most likely to suffer an RBS-style meltdown?





   |   View results
ANZ
  20%
 
Bankwest
  9%
 
CommBank
  11%
 
National Australia Bank
  17%
 
Suncorp
  24%
 
Westpac
  19%
TOTAL VOTES: 1440

Vote