SlideShare uma empresa Scribd logo
1 de 29
Mojave Security Flaws
Or their issues
>Whoami
Vitaliy Mechytashvili.
Malware Analyst with Under Defense LLC
vim@underdefense.com
https://twitter.com/myautd
https://t.me/myautd
2
Agenda
MacOS 10.14 have done a lot of security improvements but there are few secrets you
have to know, like Gatekeeper bypass, installation sources bypass and many other
tricks to infect your MacOS
3
Security Features
● Mojave security updates.
● Gatekeeper
● App Store
● Safari Extensions
● Trusted installation source
● CVE’s
4
MacOS Mojave Security Updates
Release Date: 24 September 2018.
● Control of Your privacy:
○ Requires approval before application access to your camera or microphone
○ Also requires approval before access to application with personal data, like Mail,
Contacts, etc
● Safari improvements:
○ Enhanced Tracking Prevention
○ Built-in password manager
○ Extensions can be installed only from trusted store
5
Control of privacy
This update really protects users from potentially privacy disclosure.
For real, this is only security thing in MacOS that is working properly.
What for real your privacy costs for Apple?
6
Authorization bypass
Authorization.h сomment and trampolineClient.cpp code, both source codes available on
opensource.apple.com
7
● Apps are “quarantined” when downloaded
● Gatekeeper checks signature only for quarantined apps
● After app is opened - quarantine flag is removed
● Code signature is never checked again
8
Code signing flow
9
Gatekeeper bypass
● Applications downloaded with curl are never quarantined
● Whenever checksum of application is changed, it still isn’t quarantined
● Malware can remove quarantine flag using xcode “xattr” command
● Dropper can sign any application with own certificate
Gatekeeper signatures database
● Anyone can get valid developer signature
● Signatures are revoked after user report abuse to Apple
● Signatures updates on user’s endpoints two times per year
10
App Store
Trusted mac application store. Or not?
“AppStore contains sandbox which is validate application before it appears available for users”
How does sandboxing work for real?
This is an example of search hijacker, first appeared in
Extensions store more than half of year ago.
11
Adware Doctor
This is fake “Adware Doctor” which collects user personal data.
Top 4 Canada, Top 1 US AppStore in paid applications.
Manual dynamic analysis
workshop from @DC38032
Community available on YT:
https://www.youtube.com/watch?v=B-XELDUtaa8 12
Safari Extensions Store
How to contribute to app store:
● You should clearly and accurately disclose what extensions are made available in the app’s
marketing text and the extensions may not include marketing, advertising or in-app purchases.
● They may not interfere with System or Safari UI elements and must never include malicious or
misleading content or code.
● Apple reviews all extensions and updates to ensure they work reliably.
13
How does the Extensions Store work
Search Manager.
It manually changes your homepage, new tab and default search manager to yahoo.
Works only in targeted countries.
Indicators of compromise:
● Disallow change search service and homepage manually through preferences.
● Collecting search terms for advertisements suggestions
● Doesn’t show any search result, only advertisements and promotions.
14
Search Manager
LLC UnderDefense15
Search redirecting
Using build in browser features “beforeSearch”, “beforeNavigate”.
Hijack user search term, replaces search service url to own.
16
Browsing History
Each time user opens any url, this extension catches information like web-page title and
url. Then it sends this info to its own server
17
Trusted installation source
From macOS Mojave (10.14), by default user can install applications and extensions
only from AppStore and Extensions Store.
● Extension which is installing on users system should be code-signed.
● Extension can be only installed from safari extensions store
● Extension shouldn’t violate AppStore criterias.
18
Easy to bypass
26 lines of apple-script to install malicious extension on your system:
Easy to implement and quite difficult to detect.
● Developer features can be turned off
● Extension can be placed not only in default path
19
Malware Carriers/Droppers
Adobe_Flash_Player_Installer_1337.dmg. Go ahead and install everything, you download
20
CVE List
According to all times CVE-stats,
Mac OS is TOP-4 Vulnerable OS.
21
CVE List
According to all-time CVE-stats,
Mac OS is TOP-4 Vulnerable OS.
Link: https://www.cvedetails.com/top-50-products.php?year=0
22
0-day exploit prices
23
CVE-2017-7149: Password Exposure
Apple Encrypted Volumes hint contains encryption password
24
CVE-2017-7170: Privilege Escalation
0-day discovered by Patrick Wardle (Objective See),
Secure authentication boxes stores password in tmpfile()
tmpfile() creates random named file in /tmp/
25
CVE-2017-13872: #iamroot
Click “enter” two times to get root
In macOS Sierra, you can bypass authentication by changing username to “root”
And pressing “Enter” two times
LLC UnderDefense26
How to protect yourself
● Objective-See (https://objective-see.com)
○ Knock-Knock
○ Block-Block
● Google Santa
● Any antivirus, which is not doing ML while your disk gets fully encrypted
○ BitDefender
○ MacKeeper
○ Malwarebytes
○ Norton
27
How to protect yourself
● Objective-See (https://objective-see.com)
○ Knock-Knock
○ Block-Block
● Google Santa
● Any antivirus is better than nothing
○ BitDefender
○ MacKeeper
○ Malwarebytes
○ Norton
28
Thank you!
Ukraine
Lviv Heroiv UPA 73 k.38, Lviv, 79014
Tel: +38 063 11 357 66
email: help@underdefense.com
Poland
Wrocław Rzeźnicza str. 28-31, 50-130
Tel: +48 881 300 889
email: help@underdefense.com
Malta
Birkirkara 170, Pater House, Psaila St,
BKR 9077, Tel: +356 2759 5000
email: help@underdefense.com
USA
New York 375 Park Avenue, Suite 2800, NY
Tel: +1 929 999 5101
email: help@underdefense.com
29

Mais conteúdo relacionado

Mais procurados

Recover lost contacts from iphone
Recover lost contacts from iphoneRecover lost contacts from iphone
Recover lost contacts from iphonegeorgefinley
 
Remove asearchonline.com manually for free
Remove asearchonline.com manually for freeRemove asearchonline.com manually for free
Remove asearchonline.com manually for freeharoNaroum
 
Remove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virusRemove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect viruscoseanonans
 
Uninstall searchpassage.com – searchpassage.com removal guide
Uninstall searchpassage.com – searchpassage.com removal guideUninstall searchpassage.com – searchpassage.com removal guide
Uninstall searchpassage.com – searchpassage.com removal guidecoseanonans
 
WordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdfWordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdfArthur Kasirye
 
How to update software on Mac
How to update software on MacHow to update software on Mac
How to update software on MacAsya Karapetyan
 
How to remove yeabd66.cc
How to remove yeabd66.ccHow to remove yeabd66.cc
How to remove yeabd66.ccharoNaroum
 
Small Business Cyber Security Checklist
Small Business Cyber Security ChecklistSmall Business Cyber Security Checklist
Small Business Cyber Security ChecklistGabriel Friedlander
 
Using the restful twitter’s api
Using the restful twitter’s apiUsing the restful twitter’s api
Using the restful twitter’s apiIdriss Neumann
 
How to remove cassiopesa from ie firefox chrome
How to remove cassiopesa from ie firefox chromeHow to remove cassiopesa from ie firefox chrome
How to remove cassiopesa from ie firefox chromeharoNaroum
 
Uninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.coUninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.coharoNaroum
 

Mais procurados (11)

Recover lost contacts from iphone
Recover lost contacts from iphoneRecover lost contacts from iphone
Recover lost contacts from iphone
 
Remove asearchonline.com manually for free
Remove asearchonline.com manually for freeRemove asearchonline.com manually for free
Remove asearchonline.com manually for free
 
Remove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virusRemove mystart3.dealwifi.com redirect virus
Remove mystart3.dealwifi.com redirect virus
 
Uninstall searchpassage.com – searchpassage.com removal guide
Uninstall searchpassage.com – searchpassage.com removal guideUninstall searchpassage.com – searchpassage.com removal guide
Uninstall searchpassage.com – searchpassage.com removal guide
 
WordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdfWordPress Troubleshooting Hacks.pdf
WordPress Troubleshooting Hacks.pdf
 
How to update software on Mac
How to update software on MacHow to update software on Mac
How to update software on Mac
 
How to remove yeabd66.cc
How to remove yeabd66.ccHow to remove yeabd66.cc
How to remove yeabd66.cc
 
Small Business Cyber Security Checklist
Small Business Cyber Security ChecklistSmall Business Cyber Security Checklist
Small Business Cyber Security Checklist
 
Using the restful twitter’s api
Using the restful twitter’s apiUsing the restful twitter’s api
Using the restful twitter’s api
 
How to remove cassiopesa from ie firefox chrome
How to remove cassiopesa from ie firefox chromeHow to remove cassiopesa from ie firefox chrome
How to remove cassiopesa from ie firefox chrome
 
Uninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.coUninstall searchz.co – how to remove searchz.co
Uninstall searchz.co – how to remove searchz.co
 

Semelhante a Mojave Security Flaws and Gatekeeper Bypasses

Flutter Android / iOS Build Preparation
Flutter Android / iOS Build PreparationFlutter Android / iOS Build Preparation
Flutter Android / iOS Build Preparation9 series
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingRana Khalil
 
Why should you do a pentest?
Why should you do a pentest?Why should you do a pentest?
Why should you do a pentest?Abraham Aranguren
 
How to remove smart shopsave.com
How to remove smart shopsave.comHow to remove smart shopsave.com
How to remove smart shopsave.comcoseanonans
 
Android malware presentation
Android malware presentationAndroid malware presentation
Android malware presentationSandeep Joshi
 
Web Application Penetration Tests - Vulnerability Identification and Details ...
Web Application Penetration Tests - Vulnerability Identification and Details ...Web Application Penetration Tests - Vulnerability Identification and Details ...
Web Application Penetration Tests - Vulnerability Identification and Details ...Netsparker
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Shubham Gupta
 
[MBF2] Webinar API Orange Partner #2
[MBF2] Webinar API Orange Partner #2[MBF2] Webinar API Orange Partner #2
[MBF2] Webinar API Orange Partner #2BeMyApp
 
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation APIAnti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation APIArash Ramez
 
The Future of Web Apps
The Future of Web AppsThe Future of Web Apps
The Future of Web AppsiCiDIGITAL
 
AppCoins @ CoinAdvice (4 Mar 2019)
AppCoins @ CoinAdvice (4 Mar 2019)AppCoins @ CoinAdvice (4 Mar 2019)
AppCoins @ CoinAdvice (4 Mar 2019)AppCoins
 
Dreamweaver cs5 read me
Dreamweaver cs5 read meDreamweaver cs5 read me
Dreamweaver cs5 read merubi hartanto
 
Dreamweaver cs5 read me
Dreamweaver cs5 read meDreamweaver cs5 read me
Dreamweaver cs5 read mePhp RedStorm
 
Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)Wail Hassan
 
Formación en movilidad: Conceptos de desarrollo en iOS (V)
Formación en movilidad: Conceptos de desarrollo en iOS (V) Formación en movilidad: Conceptos de desarrollo en iOS (V)
Formación en movilidad: Conceptos de desarrollo en iOS (V) Mobivery
 
AWS UG Warsaw & Serverless warsztatowo! 19.09.2019 | Hillel Solow's presentation
AWS UG Warsaw & Serverless warsztatowo! 19.09.2019 | Hillel Solow's presentationAWS UG Warsaw & Serverless warsztatowo! 19.09.2019 | Hillel Solow's presentation
AWS UG Warsaw & Serverless warsztatowo! 19.09.2019 | Hillel Solow's presentationServerless User Group Poland
 
"Don’t Run with Scissors: Serverless Security Survival Guide" | Hillel Solow,...
"Don’t Run with Scissors: Serverless Security Survival Guide" | Hillel Solow,..."Don’t Run with Scissors: Serverless Security Survival Guide" | Hillel Solow,...
"Don’t Run with Scissors: Serverless Security Survival Guide" | Hillel Solow,...LCloud
 
Session10-PHP Misconfiguration
Session10-PHP MisconfigurationSession10-PHP Misconfiguration
Session10-PHP Misconfigurationzakieh alizadeh
 

Semelhante a Mojave Security Flaws and Gatekeeper Bypasses (20)

Flutter Android / iOS Build Preparation
Flutter Android / iOS Build PreparationFlutter Android / iOS Build Preparation
Flutter Android / iOS Build Preparation
 
Assingment 3 - Bug bounty
Assingment 3 - Bug bountyAssingment 3 - Bug bounty
Assingment 3 - Bug bounty
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Why should you do a pentest?
Why should you do a pentest?Why should you do a pentest?
Why should you do a pentest?
 
How to remove smart shopsave.com
How to remove smart shopsave.comHow to remove smart shopsave.com
How to remove smart shopsave.com
 
Android malware presentation
Android malware presentationAndroid malware presentation
Android malware presentation
 
Web Application Penetration Tests - Vulnerability Identification and Details ...
Web Application Penetration Tests - Vulnerability Identification and Details ...Web Application Penetration Tests - Vulnerability Identification and Details ...
Web Application Penetration Tests - Vulnerability Identification and Details ...
 
Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016Bug Bounty #Defconlucknow2016
Bug Bounty #Defconlucknow2016
 
[MBF2] Webinar API Orange Partner #2
[MBF2] Webinar API Orange Partner #2[MBF2] Webinar API Orange Partner #2
[MBF2] Webinar API Orange Partner #2
 
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation APIAnti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
 
The Future of Web Apps
The Future of Web AppsThe Future of Web Apps
The Future of Web Apps
 
AppCoins @ CoinAdvice (4 Mar 2019)
AppCoins @ CoinAdvice (4 Mar 2019)AppCoins @ CoinAdvice (4 Mar 2019)
AppCoins @ CoinAdvice (4 Mar 2019)
 
Dreamweaver cs5 read me
Dreamweaver cs5 read meDreamweaver cs5 read me
Dreamweaver cs5 read me
 
Dreamweaver cs5 read me
Dreamweaver cs5 read meDreamweaver cs5 read me
Dreamweaver cs5 read me
 
Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)Module 12 (web application vulnerabilities)
Module 12 (web application vulnerabilities)
 
Spyware
SpywareSpyware
Spyware
 
Formación en movilidad: Conceptos de desarrollo en iOS (V)
Formación en movilidad: Conceptos de desarrollo en iOS (V) Formación en movilidad: Conceptos de desarrollo en iOS (V)
Formación en movilidad: Conceptos de desarrollo en iOS (V)
 
AWS UG Warsaw & Serverless warsztatowo! 19.09.2019 | Hillel Solow's presentation
AWS UG Warsaw & Serverless warsztatowo! 19.09.2019 | Hillel Solow's presentationAWS UG Warsaw & Serverless warsztatowo! 19.09.2019 | Hillel Solow's presentation
AWS UG Warsaw & Serverless warsztatowo! 19.09.2019 | Hillel Solow's presentation
 
"Don’t Run with Scissors: Serverless Security Survival Guide" | Hillel Solow,...
"Don’t Run with Scissors: Serverless Security Survival Guide" | Hillel Solow,..."Don’t Run with Scissors: Serverless Security Survival Guide" | Hillel Solow,...
"Don’t Run with Scissors: Serverless Security Survival Guide" | Hillel Solow,...
 
Session10-PHP Misconfiguration
Session10-PHP MisconfigurationSession10-PHP Misconfiguration
Session10-PHP Misconfiguration
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Mojave Security Flaws and Gatekeeper Bypasses

  • 2. >Whoami Vitaliy Mechytashvili. Malware Analyst with Under Defense LLC vim@underdefense.com https://twitter.com/myautd https://t.me/myautd 2
  • 3. Agenda MacOS 10.14 have done a lot of security improvements but there are few secrets you have to know, like Gatekeeper bypass, installation sources bypass and many other tricks to infect your MacOS 3
  • 4. Security Features ● Mojave security updates. ● Gatekeeper ● App Store ● Safari Extensions ● Trusted installation source ● CVE’s 4
  • 5. MacOS Mojave Security Updates Release Date: 24 September 2018. ● Control of Your privacy: ○ Requires approval before application access to your camera or microphone ○ Also requires approval before access to application with personal data, like Mail, Contacts, etc ● Safari improvements: ○ Enhanced Tracking Prevention ○ Built-in password manager ○ Extensions can be installed only from trusted store 5
  • 6. Control of privacy This update really protects users from potentially privacy disclosure. For real, this is only security thing in MacOS that is working properly. What for real your privacy costs for Apple? 6
  • 7. Authorization bypass Authorization.h сomment and trampolineClient.cpp code, both source codes available on opensource.apple.com 7
  • 8. ● Apps are “quarantined” when downloaded ● Gatekeeper checks signature only for quarantined apps ● After app is opened - quarantine flag is removed ● Code signature is never checked again 8 Code signing flow
  • 9. 9 Gatekeeper bypass ● Applications downloaded with curl are never quarantined ● Whenever checksum of application is changed, it still isn’t quarantined ● Malware can remove quarantine flag using xcode “xattr” command ● Dropper can sign any application with own certificate
  • 10. Gatekeeper signatures database ● Anyone can get valid developer signature ● Signatures are revoked after user report abuse to Apple ● Signatures updates on user’s endpoints two times per year 10
  • 11. App Store Trusted mac application store. Or not? “AppStore contains sandbox which is validate application before it appears available for users” How does sandboxing work for real? This is an example of search hijacker, first appeared in Extensions store more than half of year ago. 11
  • 12. Adware Doctor This is fake “Adware Doctor” which collects user personal data. Top 4 Canada, Top 1 US AppStore in paid applications. Manual dynamic analysis workshop from @DC38032 Community available on YT: https://www.youtube.com/watch?v=B-XELDUtaa8 12
  • 13. Safari Extensions Store How to contribute to app store: ● You should clearly and accurately disclose what extensions are made available in the app’s marketing text and the extensions may not include marketing, advertising or in-app purchases. ● They may not interfere with System or Safari UI elements and must never include malicious or misleading content or code. ● Apple reviews all extensions and updates to ensure they work reliably. 13
  • 14. How does the Extensions Store work Search Manager. It manually changes your homepage, new tab and default search manager to yahoo. Works only in targeted countries. Indicators of compromise: ● Disallow change search service and homepage manually through preferences. ● Collecting search terms for advertisements suggestions ● Doesn’t show any search result, only advertisements and promotions. 14
  • 16. Search redirecting Using build in browser features “beforeSearch”, “beforeNavigate”. Hijack user search term, replaces search service url to own. 16
  • 17. Browsing History Each time user opens any url, this extension catches information like web-page title and url. Then it sends this info to its own server 17
  • 18. Trusted installation source From macOS Mojave (10.14), by default user can install applications and extensions only from AppStore and Extensions Store. ● Extension which is installing on users system should be code-signed. ● Extension can be only installed from safari extensions store ● Extension shouldn’t violate AppStore criterias. 18
  • 19. Easy to bypass 26 lines of apple-script to install malicious extension on your system: Easy to implement and quite difficult to detect. ● Developer features can be turned off ● Extension can be placed not only in default path 19
  • 20. Malware Carriers/Droppers Adobe_Flash_Player_Installer_1337.dmg. Go ahead and install everything, you download 20
  • 21. CVE List According to all times CVE-stats, Mac OS is TOP-4 Vulnerable OS. 21
  • 22. CVE List According to all-time CVE-stats, Mac OS is TOP-4 Vulnerable OS. Link: https://www.cvedetails.com/top-50-products.php?year=0 22
  • 24. CVE-2017-7149: Password Exposure Apple Encrypted Volumes hint contains encryption password 24
  • 25. CVE-2017-7170: Privilege Escalation 0-day discovered by Patrick Wardle (Objective See), Secure authentication boxes stores password in tmpfile() tmpfile() creates random named file in /tmp/ 25
  • 26. CVE-2017-13872: #iamroot Click “enter” two times to get root In macOS Sierra, you can bypass authentication by changing username to “root” And pressing “Enter” two times LLC UnderDefense26
  • 27. How to protect yourself ● Objective-See (https://objective-see.com) ○ Knock-Knock ○ Block-Block ● Google Santa ● Any antivirus, which is not doing ML while your disk gets fully encrypted ○ BitDefender ○ MacKeeper ○ Malwarebytes ○ Norton 27
  • 28. How to protect yourself ● Objective-See (https://objective-see.com) ○ Knock-Knock ○ Block-Block ● Google Santa ● Any antivirus is better than nothing ○ BitDefender ○ MacKeeper ○ Malwarebytes ○ Norton 28
  • 29. Thank you! Ukraine Lviv Heroiv UPA 73 k.38, Lviv, 79014 Tel: +38 063 11 357 66 email: help@underdefense.com Poland Wrocław Rzeźnicza str. 28-31, 50-130 Tel: +48 881 300 889 email: help@underdefense.com Malta Birkirkara 170, Pater House, Psaila St, BKR 9077, Tel: +356 2759 5000 email: help@underdefense.com USA New York 375 Park Avenue, Suite 2800, NY Tel: +1 929 999 5101 email: help@underdefense.com 29

Notas do Editor

  1. https://www.youtube.com/watch?v=B-XELDUtaa8