{"id":13080,"date":"2018-08-12T10:45:14","date_gmt":"2018-08-12T18:45:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/12\/news-6847\/"},"modified":"2018-08-12T10:45:14","modified_gmt":"2018-08-12T18:45:14","slug":"news-6847","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/12\/news-6847\/","title":{"rendered":"Invisible Mouse Clicks Let Hackers Burrow Deep into MacOS"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b6c9522f6d47809bff3a5c3\/master\/pass\/Apple_KX2GDJ.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Sun, 12 Aug 2018 17:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">One way operating <\/span>system developers try to protect a computers&#x27;s secrets from probing hackers is with an appeal to the human at the keyboard. By giving the user a choice to \u201callow\u201d or \u201cdeny\u201d a program\u2019s access to sensitive data or features, the operating system can create a checkpoint that halts malware while letting innocent applications through. But former NSA staffer and noted Mac hacker Patrick Wardle has spent the last year exploring a nagging problem: What if a piece of malware can reach out and click on that \u201callow\u201d button just as easily as a human?<\/p>\n<p>At the DefCon hacker conference Sunday in Las Vegas, Wardle plans to present a devious set of automated attacks he\u2019s pulled off against macOS versions as recent as 2017 release High Sierra, capable of so-called synthetic clicks that allow malware to breeze through the permission prompts meant to block it. The result could be malware that, once it has found a way onto a user&#x27;s machine, can bypass layers of security to perform tricks like finding the user&#x27;s location, stealing their contacts or, with his most surprising and critical technique, taking over the deepest core of the operating system, known as the kernel, to fully control the computer.<\/p>\n<p class=\"paywall\">&quot;The user interface is that single point of failure,&quot; says Wardle, who now works as a security researcher for Digita Security. &quot;If you have a way to synthetically interact with these alerts, you have a very powerful and generic way to bypass all these security mechanisms.&quot;<\/p>\n<p class=\"paywall\">Wardle&#x27;s attacks, to be clear, don&#x27;t offer a hacker an initial foothold on a computer; they only help a hacker&#x27;s malware penetrate layers of security on an already infected machine. But Wardle argues they could nonetheless serve as powerful tools for sophisticated attackers trying to silently steal more data from, or gain deeper control of, a machine they\u2019ve already penetrated with a malicious attachment in a phishing email or some other common technique.<\/p>\n<p class=\"paywall\">MacOS includes a feature that lets some programs, like AppleScript, generate \u201csynthetic clicks&quot;\u2014mouse clicks that are generated by a program rather than a human finger\u2014that allow features like automation and usability tools for the disabled. To keep malware from abusing those programmed clicks, however, it blocks them on some sensitive \u201callow\u201d prompts.<\/p>\n<p class=\"paywall\">But Wardle was surprised to discover that macOS fails to protect the prompts for things like extracting the user\u2019s contacts, accessing their calendar, or reading the latitude and longitude of their machine, determined by which Wi-Fi networks it\u2019s connected to. His malicious test code could simply click through prompts as easily as human.<\/p>\n<p>&#x27;It&#x27;s this ridiculous bypass that I found by incorrectly pasting code.&#x27;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Patrick Wardle, Digita Security<\/p>\n<p class=\"paywall\">Wardle has also experimented with using synthetic clicks for far more serious hacking techniques. He had previously discovered that malware could also use an obscure macOS feature called &quot;mouse keys,&quot; which allows the user to manipulate the mouse cursor with the keyboard, to perform synthetic clicks that bypass security prompts. In a <a href=\"https:\/\/twitter.com\/patrickwardle\/status\/977181640723111936\" target=\"_blank\">talk he gave last March at the SyScan security conference<\/a> in Singapore, Wardle pointed out that Apple had overlooked the mouse key function, so that it wasn&#x27;t blocked when it clicked through &quot;allow&quot; prompts on even highly sensitive features like accessing the macOS keychain, which contains users&#x27; passwords, and installing kernel extensions that can add code to the most powerful part of a Mac&#x27;s operating system.<\/p>\n<p class=\"paywall\">Apple responded by patching Wardle&#x27;s mouse-key hack. But when he later tried testing ways to get around that patch, he stumbled into an even stranger bug. A synthetic click includes both a &quot;down&quot; command and an &quot;up&quot; command, which correlate to clicking a mouse and then releasing it. But Wardle accidentally copied and pasted the wrong snippet of code, so that it performed <em>two<\/em> down commands instead. When he ran that code, the operating system mysteriously translated the second &quot;down&quot; into an &quot;up,&quot; completing the click. And those &quot;down-down&quot; synthetic clicks, Wardle discovered, aren&#x27;t actually blocked when used to click on an &quot;allow&quot; prompt for installing a kernel extension.<\/p>\n<p class=\"paywall\">&quot;It&#x27;s this ridiculous bypass that I found by incorrectly pasting code,&quot; he says. &quot;I tripped over it because I wanted to run out and surf and I was being lazy.&quot;<\/p>\n<p class=\"paywall\">If malware can use that trick to install a kernel extension, it can often exploit that added code to gain full control of a target machine. Kernel extensions\u2014like drivers in Windows\u2014must be signed by a developer for MacOS to install them. But if an existing signed kernel extension has a security flaw, a piece of malware can install that extension and then exploit its flaw to take control of the kernel. Wardle points out that  the <a href=\"https:\/\/www.wired.com\/story\/router-hacking-slingshot-spy-operation-compromised-more-than-100-targets\/\">Slingshot malware Kaspersky revealed last March<\/a>, which was later <a href=\"https:\/\/www.cyberscoop.com\/kaspersky-slingshot-isis-operation-socom-five-eyes\/\" target=\"_blank\">revealed to be a hacking tool used by US special forces to track ISIS targets<\/a>, used this exact technique.<\/p>\n<p class=\"paywall\">&quot;A lot of advanced malware really tries to get into the kernel. It\u2019s like god mode,&quot; Wardle says. &quot;If you can infect the kernel, you can see everything, bypass any security mechanism, hide processes, sniff user keystrokes. It\u2019s really game over.&quot;<\/p>\n<p class=\"paywall\">Apple didn&#x27;t respond to WIRED&#x27;s request for comment on Wardle&#x27;s findings. Wardle admits that he didn&#x27;t actually tell Apple the details of his research ahead of his DefCon talk, instead handing them an unpleasant surprise. But he argues that after he alerted the company to his earlier findings before SyScan, Apple shouldn&#x27;t have left sloppy, exploitable bugs in the same security protections. &quot;I&#x27;ve reported a ton of bugs to them and it doesn\u2019t seem like it&#x27;s inspiring changes,&quot; Wardle says. &quot;So let\u2019s try something else.&quot;<\/p>\n<p class=\"paywall\">Of course, the pop-up prompts that Wardle&#x27;s synthetic clicks bypass are still be visible to users, tipping them off to the presence of malware on their computer. But Wardle points out that malware can wait for signs of inactivity, which hint that the user might have walked away from the machine, before triggering and clicking through macOS&#x27;s prompts. It can even dim the screen during those inactive moments so that those prompts aren&#x27;t visible at all.<\/p>\n<p class=\"paywall\">Wardle concedes that his synthetic click attacks don&#x27;t exactly offer instant access to a Mac&#x27;s inner sanctum. But in certain hackers&#x27; hands, they could be a dangerous tool. And he argues they&#x27;re part of a repeating pattern of <a href=\"https:\/\/www.wired.com\/story\/apples-security-macos-high-sierra-ios-11\/\">Apple&#x27;s recent security sloppiness<\/a>, from a vulnerabilty that allowed anyone to gain privileged access to a Mac <a href=\"https:\/\/www.wired.com\/story\/macos-high-sierra-hack-root\/\">simply by typing &quot;root&quot; as their username<\/a> to a bug in Apple&#x27;s file system software that revealed users&#x27; passwords when someone merely <a href=\"https:\/\/www.theregister.co.uk\/2017\/10\/05\/apple_patches_password_hint_bug_that_revealed_password\/\" target=\"_blank\">asks for a password hint<\/a>.<\/p>\n<p class=\"paywall\">&quot;We&#x27;re seeing these really low-hanging vulnerabilities that keep popping up,&quot; Wardle says. &quot;This bug is so lame in a way, but it&#x27;s also very powerful. It makes me want to laugh and cry at the same time.&quot;<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/invisible-mouse-clicks-hack-macos\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5b6c9522f6d47809bff3a5c3\/master\/pass\/Apple_KX2GDJ.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Sun, 12 Aug 2018 17:00:00 +0000<\/strong><\/p>\n<p>A former NSA hacker finds a new way malware can take control of a Mac&#8217;s mouse for a powerful intrusion technique.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-13080","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13080"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13080\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13080"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}