9to5Mac - Tuesday, September 26, 2017 at 5:07 AM
Major macOS (incl. High Sierra) Keychain password extraction vulnerability
to be addressed by Apple in update [Video]
 
A macOS vulnerability discovered by security researcher Patrick Wardle
allows any app - signed or unsigned - to extract plain text passwords from
Keychain. Wardle demonstrated the exploit with a proof of concept app, seen
in the video below.
The vulnerability is a huge one, because Keychain data is secured by 256-bit
AES encryption, which should make it virtually uncrackable - and because the
bug affects all versions of macOS, including High Sierra .

What is supposed to happen is that only the app authorized to access a
particular password can decrypt it. But Wardle demonstrated his app was able
to extract and decrypt passwords for Twitter, Facebook, and Bank of America.
The app is able to do this without any user intervention.
The demonstration video shows it running in an unsigned app, which are
blocked by default in macOS, but Wardle says this was only to demonstrate
how low the security bar is set. It works equally well in signed apps.
As a responsible researcher, Wardle reported the vulnerability to Apple on
September 7 and will not disclose the method used until Apple has patched
it. He told Gizmodo that the company is likely to do so soon.
He also says that this is not a reason to hold off on upgrading to High
Sierra: it's not a newly-introduced bug.
I think everyone should update. There's a lot of good built-in security
features. This attack works on older versions of macOS as well. There's no
reason for people not to upgrade.
Check out the video demo below.
Patrick Wardle is a former NSA staffer who last year demonstrated Mac
malware that could tap into live webcam and microphone feeds. He also
discovered Mac malware in the wild that allowed access to webcam photos,
screenshots and key-logging, and a separate exploit that would let someone
with local access to a Mac escalate their privileges to root.
[embedded content]
 
 Original Article At:
https://9to5mac.com/2017/09/26/macos-keychain-vulnerability/

-- 
The following information is important for all members of the Mac Visionaries 
list.

If you have any questions or concerns about the running of this list, or if you 
feel that a member's post is inappropriate, please contact the owners or 
moderators directly rather than posting on the list itself.

Your Mac Visionaries list moderator is Mark Taylor.  You can reach mark at:  
macvisionaries+modera...@googlegroups.com and your owner is Cara Quinn - you 
can reach Cara at caraqu...@caraquinn.com

The archives for this list can be searched at:
http://www.mail-archive.com/macvisionaries@googlegroups.com/
--- 
You received this message because you are subscribed to the Google Groups 
"MacVisionaries" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to macvisionaries+unsubscr...@googlegroups.com.
To post to this group, send email to macvisionaries@googlegroups.com.
Visit this group at https://groups.google.com/group/macvisionaries.
For more options, visit https://groups.google.com/d/optout.

Reply via email to