{"id":18089,"date":"2022-02-02T10:50:30","date_gmt":"2022-02-02T18:50:30","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11822\/"},"modified":"2022-02-02T10:50:30","modified_gmt":"2022-02-02T18:50:30","slug":"news-11822","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11822\/","title":{"rendered":"Safari Flaws Exposed Webcams, Online Accounts, and More"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/61f034d2f355cd4b798a010e\/master\/pass\/Sec_Safari_GettyImages-1270683438.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 26 Jan 2022 00:39:25 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Usually the worst<\/span> thing that happens when you have dozens of browser tabs open is you can&#x27;t find the one that suddenly starts blasting random ads. But a group of macOS vulnerabilities\u2014fixed by Apple at the end of last year\u2014could have exposed your Safari tabs and other browser settings to attack, opening the door for hackers to grab control of your online accounts, turn on your microphone, or take over your webcam.<\/p>\n<p class=\"paywall\">MacOS has built-in protections to prevent this sort of attack, including Gatekeeper, which confirms the validity of the software your Mac runs. But <a data-offer-url=\"https:\/\/www.ryanpickren.com\/safari-uxss\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.ryanpickren.com\/safari-uxss&quot;}\" href=\"https:\/\/www.ryanpickren.com\/safari-uxss\" rel=\"nofollow noopener\" target=\"_blank\">this hack<\/a> got around those safeguards by abusing iCloud and Safari features that macOS already trusts. While poking for potential weaknesses in Safari, independent security researcher Ryan Pickren started looking at iCloud&#x27;s document-sharing mechanism because of the trust inherent between iCloud and macOS. When you share an iCloud document with another user, Apple uses a behind-the-scenes app called ShareBear to coordinate the transfer. Pickren found that he could manipulate ShareBear to offer victims a malicious file.\u00a0<\/p>\n<p class=\"paywall\">\u201cThe attacker is basically punching a hole in the browser.\u201d<\/p>\n<p class=\"paywall\">Ryan Pickren, security researcher<\/p>\n<p class=\"paywall\">In fact, the file itself doesn&#x27;t even have to be malicious at first, making it easier to offer victims something compelling and trick them into clicking. Pickren found that because of the trusted relationship between Safari, iCloud, and ShareBear, an attacker could actually revisit what they shared with a victim later and silently swap the file for a malicious one. All of this can happen without the victim receiving a new prompt from iCloud or realizing that anything has changed.\u00a0<\/p>\n<p class=\"paywall\">Once the hacker has staged the attack, they can essentially take over Safari, see what the victim sees, access the accounts the victim is logged into, and abuse permissions the victim has granted websites to access their camera and microphone. An attacker could also access other files stored locally on the victim&#x27;s Mac.<\/p>\n<p class=\"paywall\">\u201cThe attacker is basically punching a hole in the browser,\u201d says Ryan Pickren, the security researcher who disclosed the vulnerabilities to Apple. \u201cSo if you\u2019re signed in to Twitter.com on one tab, I could jump into that and do everything you can from Twitter.com. But that\u2019s nothing to do with Twitter\u2019s servers or security; I as the attacker am just assuming the role that you already have in your browser.\u201d<\/p>\n<p class=\"paywall\">In October, <a data-offer-url=\"https:\/\/support.apple.com\/en-us\/HT212869\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/support.apple.com\/en-us\/HT212869&quot;}\" href=\"https:\/\/support.apple.com\/en-us\/HT212869\" rel=\"nofollow noopener\" target=\"_blank\">Apple patched<\/a> the vulnerability in Safari&#x27;s WebKit engine and made revisions in iCloud. And in December <a data-offer-url=\"https:\/\/support.apple.com\/en-us\/HT212981\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/support.apple.com\/en-us\/HT212981&quot;}\" href=\"https:\/\/support.apple.com\/en-us\/HT212981\" rel=\"nofollow noopener\" target=\"_blank\">it patched<\/a> a related vulnerability in its Script Editor code automation and editing tool.<\/p>\n<p class=\"paywall\">\u201cThis is an impressive exploit chain,\u201d says Patrick Wardle, a longtime researcher and founder of the macOS security nonprofit Objective-See. \u201cIt&#x27;s clever that it exploits design flaws and creatively uses built-in macOS capabilities to circumvent defense mechanisms and compromise the\u00a0system.\u201d<\/p>\n<p class=\"paywall\">Pickren previously discovered a series of Safari bugs that could have <a href=\"https:\/\/www.wired.com\/story\/hacker-apple-safari-webcam-bug\/\">enabled webcam takeovers<\/a>. He disclosed the new findings through Apple&#x27;s bug bounty program in mid-July, and the company awarded him $100,500. The amount is not unprecedented for Apple&#x27;s disclosure program, but its size reflects the severity of the flaws. In 2020, for example, the company <a data-offer-url=\"https:\/\/threatpost.com\/apple-100k-bounty-critical-sign-in-with-apple-flaw\/156167\/#:~:text=The%20security%20researcher%2C%20Bhavuk%20Jain,awarded%20%24100%2C000%20for%20the%20find.&amp;text=%E2%80%9CThis%20bug%20could%20have%20resulted,valid%20Apple%20ID%20or%20not.%E2%80%9D\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/threatpost.com\/apple-100k-bounty-critical-sign-in-with-apple-flaw\/156167\/#:~:text=The%20security%20researcher%2C%20Bhavuk%20Jain,awarded%20%24100%2C000%20for%20the%20find.&amp;text=%E2%80%9CThis%20bug%20could%20have%20resulted,valid%20Apple%20ID%20or%20not.%E2%80%9D&quot;}\" href=\"https:\/\/threatpost.com\/apple-100k-bounty-critical-sign-in-with-apple-flaw\/156167\/#:~:text=The%20security%20researcher%2C%20Bhavuk%20Jain,awarded%20%24100%2C000%20for%20the%20find.&amp;text=%E2%80%9CThis%20bug%20could%20have%20resulted,valid%20Apple%20ID%20or%20not.%E2%80%9D\" rel=\"nofollow noopener\" target=\"_blank\">paid out $100,000<\/a> for a crucial flaw in its Sign In With Apple single sign-on system.<\/p>\n<p class=\"paywall\">Safari and Webkit, though, have a <a href=\"https:\/\/www.wired.com\/story\/ios-security-imessage-safari\/\">particular set of security challenges<\/a> because they are such massive platforms. And Apple has had a difficult time <a href=\"https:\/\/www.wired.com\/story\/ios-15-bug-leaking-user-browsing-activity-in-real-time\/\">getting a handle<\/a> on the problem, <a data-offer-url=\"https:\/\/arstechnica.com\/gadgets\/2021\/05\/exploitable-security-bug-remains-in-ios-and-macos-3-weeks-after-upstream-fix\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/gadgets\/2021\/05\/exploitable-security-bug-remains-in-ios-and-macos-3-weeks-after-upstream-fix\/&quot;}\" href=\"https:\/\/arstechnica.com\/gadgets\/2021\/05\/exploitable-security-bug-remains-in-ios-and-macos-3-weeks-after-upstream-fix\/\" rel=\"nofollow noopener\" target=\"_blank\">even when<\/a> vulnerabilities are public for weeks or months.\u00a0<\/p>\n<p class=\"paywall\">\u201cAs systems become more complex, they introduce more bugs, and that\u2019s especially true for web browsers these days,\u201d Pickren says. \u201cSafari can do so many things, it\u2019s really no surprise that there are going to be more bugs as more features come out.\u201d<\/p>\n<p class=\"paywall\">Such bugs may be common, but that doesn&#x27;t make them any less serious. Attackers regularly take advantage of browser vulnerabilities for both criminal and nation-state hacking. For example, they are commonly <a href=\"https:\/\/www.wired.com\/story\/ios-macos-hacks-hong-kong-watering-hole\/\">exploited in watering hole attacks<\/a> that target visitors of tainted websites. And hackers actively use unpatched \u201czero-day\u201d browser vulnerabilities they&#x27;ve discovered or purchased, along with older bugs that they can exploit opportunistically when targets haven&#x27;t updated their browsers.\u00a0<\/p>\n<p class=\"paywall\">\u201cA bug like this really stresses how crucial it is to keep your browser up to date,\u201d Pickren says. \u201cIt&#x27;s an easy thing to push off, but it&#x27;s ultra-important.\u201d<\/p>\n<p class=\"paywall\">It&#x27;s solid advice, regardless of your browser of choice.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/safari-flaws-webcam-online-accounts-mic\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/61f034d2f355cd4b798a010e\/master\/pass\/Sec_Safari_GettyImages-1270683438.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 26 Jan 2022 00:39:25 +0000<\/strong><\/p>\n<p>Apple awarded a $100,500 bug bounty to the researcher who discovered the latest major vulnerability in its browser.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-18089","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18089"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18089\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}