iTnews

macOS zero-day bypasses webcam, storage access alert prompts

By Juha Saarinen on May 25, 2021 12:13PM
macOS zero-day bypasses webcam, storage access alert prompts

AppleScript malware borrows permissions from existing apps.

Security researchers have outlined an ingenious zero-day malware attack that bypassed restrictions in Apple's macOS operating system that alert users when webcams and microphones on their computers are accessed.

The XCSSET malware that security vendor Trend Micro analysed [pdf] in August last year infects Apple Xcode software development projects for supply-chain attacks.

It has been actively exploiting a zero-day vulnerability to take screenshots of users' desktops, without requesting permission from them, researchers at JAMF said.

JAMF researchers Stuart Ashenbrenner, Jaron Bradley and Ferdous Saljooki said the exploit could be used by attackers to get full disk access, screen recording and other functions that would normally require explicit permissions from users, in the form of a pop-up prompt.

The malware is able to check for already-installed applications like the Zoom video conferencing software that users have granted system access permissions to.

XCSSET can piggyback on such "donor apps" to run its own malicious code to access webcams and microphones, without triggering the prompts created by Apple's Transparency Consent and Control (TCC) framework that would normally alert users to what is going on.

A novel aspect of the malware is how it uses the AppleScript scripting language that can be used to control macOS applications.

"Much of the time the malware author leverages AppleScripts in their attack chain due to the facility in which it handles many bash commands, even downloading and/or executing Python scripts in an effort to obfuscate their intentions through a confusing use of various scripting languages," the researchers wrote.

Apple has patched the vulnerability in macOS 11.4 and added detection for the malware in its Xprotect software.

It is not known which threat actor is behind XCSSET, which has utilised two other zero-days in the past.

One exploit bypassed the macOS system integrity protection (SIP) to download Safari browser cookies.

A second one bypassed permission prompts to install a developer version of the Safari browser, Trend Micro found.

The two latter zero-day exploits have also been patched by Apple in macOS 11.4.

Apple's top executive in charge of software development recently raised eyebrows when he testified under oath in the court case against Epic Games that the company's Mac platform has a level of malware "that we don't find acceptable".

Federighi testified that there have been 130 types of Mac malware, with one of them infecting 300,000 systems.

Nevertheless, Federighi believes the Mac is the safest possible in terms of PC-class devices.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
applejamfmacossecuritytcctransparency consent and controlxcsset

Partner Content

Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
5 essential digital transformation ideas
Promoted Content 5 essential digital transformation ideas
Alienated from your own data? You’re not alone
Promoted Content Alienated from your own data? You’re not alone
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • 11th Annual Fraud Prevention Summit 2022
  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Juha Saarinen
May 25 2021
12:13PM
0 Comments

Related Articles

  • Apple patches actively exploited macOS Big Sur bug
  • Emergency patches out for exploited Apple zero-days
  • Surprise Apple macOS and iOS updates fix a slew of vulnerabilities
  • Apple patches exploited iOS and macOS zero-day
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co's 250Mbps and gigabit growth is finally clear

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co sizes up six-figure customer exodus a year to fixed wireless

NBN Co to cut 160 applications under $200m IT simplification

NBN Co to cut 160 applications under $200m IT simplification

What to expect from the incoming Labor government

What to expect from the incoming Labor government

Digital Nation

Why do DeFi and DAOs matter to business?
Why do DeFi and DAOs matter to business?
Lendlease launches its own metaverse in Milan
Lendlease launches its own metaverse in Milan
COVER STORY: A Year in the Metaverse
COVER STORY: A Year in the Metaverse
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
CTO Juergen Mueller offers a glimpse into SAP's metaverse play
COVER STORY: Data and IoT set digital agriculture on a sustainable future
COVER STORY: Data and IoT set digital agriculture on a sustainable future
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.