{"id":192729,"date":"2015-03-18T02:05:57","date_gmt":"2015-03-18T06:05:57","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/ex-nsa-researcher-finds-sneaky-way-past-apple-macs-gatekeeper.php"},"modified":"2015-03-18T02:05:57","modified_gmt":"2015-03-18T06:05:57","slug":"ex-nsa-researcher-finds-sneaky-way-past-apple-macs-gatekeeper","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/ex-nsa-researcher-finds-sneaky-way-past-apple-macs-gatekeeper.php","title":{"rendered":"Ex-NSA Researcher Finds Sneaky Way Past Apple Mac&#39;s Gatekeeper"},"content":{"rendered":"<p><p>    Want to know something odd? Its 2015 and all the top    anti-virus products for Mac OS X use insecure lines to transmit    their software to Apple    Apple machines. Download    files, known as .dmg    files,for products including Kaspersky, Symantec Symantec, Avast,    Avira, Intego, BitDefender, Trend Micro, ESET and F-Secure are    all sentover unencrypted HTTP lines, rather than the more    secure HTTPS. There is method in their madness, as they trust    Apples Gatekeepersecurity    technology to recognise the digital signatures they sign their    software with that should guarantee the authenticity of the    download.  <\/p>\n<p>    But a former NSA and NASA staffer Patrick Wardle, who now heads    up research at security start-up Synack, believes he has found    a new way to abuse such insecure downloads and bypass    protections in Apple Macs without getting caught. Normally,    anyone who intercepts a download to turn it nasty wont get    away with it, as Mac Gatekeeperwill see that the vendors    original signature has been altered or taken away entirely, and    the software tampered with, meaning its no longer trusted.  <\/p>\n<p>    Yetthe Gatekeeper software doesnt check all components    of Mac OS X download files, according to Wardle. He believes he    can sneak a malicious version of whats known as a     dylib file into legitimate downloads done over HTTP to    infect Macs and start stealing data.These dylibs (short    for dynamic libraries) are designed to be re-used by different    applications; they might be used for actions such as    compressing a file or using native graphics capabilities of the    operating system. Theyre supposed to make apps work more    efficiently.  <\/p>\n<p>    If an attacker can hijack the dylib processes used by Mac    apps, however, they can carry out nasty attacks and send user    data to their own servers, the researcher explained. Such an    attack would not be trivial, Wardle admits. First, the    attacker would have to get on the same network as a target,    either by breaching it or simply logging on to the same public    Wi-Fi. They would also have to injecta    legitimate yet vulnerable application into the    downloadand shuffle around the content of    the .dmg so thatthe injected legitimate    softwareis shown to the user. The latter is not so    tricky:the attacker can set the name and    icon of thisvulnerable app so nothing looks    suspicious, said Wardle.  <\/p>\n<p>    Finding vulnerable apps shouldnt be too hard    either.Wardle created a scanner that looked for    applications that would use his naughty dylibs. He found around    150 on his own machine, including hugely popular software    likeMicrosoftWord and Excel,Apples own    iCloud Photos and Dropbox. The list also includedApples    developer tool XCODE and email encryption key management    software GPG Keychain, both of which he abused in his proof of    concept attacks. According to a recent article in The    Intercept, Snowden files showed researchers were demonstrating    how amodified    version of XCODEcould be used to siphon off targets    passwords and other data. Wardle said it was 100 per cent    coincidence that his former employer had also targeted XCODE.  <\/p>\n<p>    Wardled noted that apps from Apples Mac App Store are not    vulnerable.  <\/p>\n<p>      Apps vulnerable to dylib attacks  slide from Patrick Wardle    <\/p>\n<p>    Despite the barriers to successful exploitation, his techniques    have provided him with a novel way to bypass Gatekeepers    draconian detection mechanism (its also not too dissimilar    from DLL    attacks of yore on Windows).It is, he added, a    cunning way to bypass Mac OS X Gatekeeper protections and allow    hackers to go back to their old tricks.  <\/p>\n<p>    When the injected    legitimateapplication is launched the    unsigned malicious dylib is loaded or    executed(even if the user sets his machine    to accept only all apps from the Mac App Store) before    theapps main code. At this point the dylib    can do anything. I see it a)kicking off the    legitimate application that the user was downloading    sonothing seems amiss, and b) installing the    implant component which will then complete the    rest of the attack, persistently infecting the    userscomputer. He noted theattack    should also work on downloaded .zip    filesthat contain applications.  <\/p>\n<p>      Mac OS X dylib hijacking attacks  slide from Patrick Wardle    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/03\/17\/apple-mac-gatekeeper-bypass-exacerbated-by-unencrypted-av-downloads\/?ss=Security\/RK=0\/RS=IigIfRVQuvSLl9zGTCWG6SnCuFA-\" title=\"Ex-NSA Researcher Finds Sneaky Way Past Apple Mac&#39;s Gatekeeper\">Ex-NSA Researcher Finds Sneaky Way Past Apple Mac&#39;s Gatekeeper<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Want to know something odd? Its 2015 and all the top anti-virus products for Mac OS X use insecure lines to transmit their software to Apple Apple machines. Download files, known as .dmg files,for products including Kaspersky, Symantec Symantec, Avast, Avira, Intego, BitDefender, Trend Micro, ESET and F-Secure are all sentover unencrypted HTTP lines, rather than the more secure HTTPS <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/ex-nsa-researcher-finds-sneaky-way-past-apple-macs-gatekeeper.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-192729","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/192729"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=192729"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/192729\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=192729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=192729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=192729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}