Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/9/2011
05:36 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Anatomy Of A Mac APT Attack

Mac users might not have a lot of exploits to worry about, but their lack of security worries makes them an APT attacker's dream come true

You've heard it all before: If you're a Mac, then you're immune from most of the latest security threats. That has led some organizations worried about cyberespionage-type attacks to consider ditching their target-prone Windows machines for their Mac iOS counterparts, according to a team of researchers who spoke at Black Hat USA last week in Las Vegas.

Click here for more of Dark Reading's Black Hat articles.

Mac OS X might have little or no exploits aimed at it right now, but security worry-free Mac users are still susceptible to targeted attacks -- especially ones like advanced persistent threat (APT) that use social engineering, according to the researchers. A recent report by ESET found that while 52 percent of Windows users feel "extremely" or "very" vulnerable to cybercrime, only 20 percent of Mac users feel that way.

"Mac users are trained to feel safe, and they have a long history of not being exploited by attackers. They get used to clicking through unsigned apps," said Paul Youn, a researcher with iSec Partners.

And that's where the Mac's downfall could be when it comes to a targeted attack like an APT.

Youn, along with fellow iSec researchers Alex Stamos, Tom Daniels, Aaron Grattafiori, and BJ Orvis, decided to analyze just how a Mac could sustain a targeted attack by an APT attacker. "The reason we're doing this talk is because, in part, of our incident response on APT, [clients] said, 'Maybe we should switch to Macs,'" Stamos said in the team's presentation. "They asked us what would that mean for their ability to withstand those attacks. We don't know. There has been no research into this [before]."

Macs, which hold about 6 to 8 percent of the desktop market share, overall suffer fewer threats and attacks, and no popular crimeware kits are available for Mac OS 10. "There are a lot of things that makes Mac users much safer than Windows users," Youn said. So far, Mac attacks have mainly been social engineering-based, such as the recent Mac Defender fake antivirus scam, he said.

But the Mac OS has plenty of vulnerabilities that are ripe for attackers' picking, even if they haven't been exploited yet, according to the researchers. A 2008 IBM X-Force report showed that OS 10 had 14.3 vulnerabilities -- more than any other operating system -- and Apple's latest OS X patch included 39 CVEs. "They may be safer, but that doesn't mean the OS is more secure," Youn said. "Malware can exist on an OS 10, and Mac users may be susceptible to social engineering.

APT attackers don't care what OS a target is running: "That the typical Mac user doesn't get hit often has no bearing on the APT," he said. "There are plenty of vulnerabilities that could be weaponized to exploit Mac users if someone bothered to do it."

And unlike with Windows, few tools are available for conducting a forensics investigation on Macs. Chester Wisniewski, senior security adviser at Sophos Canada, says even if you want to investigate a breach on a Mac platform, that can be difficult. "OS 10 is just starting to get tools," he says. "There's a lack of mature tools for Mac OS X forensics."

InfoSec Partners' Stamos says the key with APT-style attacks is being able to see and analyze what has hit the victim machines. "There's no good way to check the integrity of a Mac when it gets hit," he said.

Among the weaknesses in the Mac that could be used for a targeted attack are the lack of a standardized authentication mechanism; authentication weaknesses in AFP, OpenDirectory, and ServerAdmin; and that Bonjour can make local DNS poisoning a fairly simple attack, the researchers said. Local and network privilege escalation is easy to accomplish, they said.

A copy of their presentation, "Macs In the Age Of APT," is available here (PDF) for download.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
CVE-2020-13646
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.