Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple App Security Fails Leave Macs And iPhones Vulnerable To 'Devastating' Attacks
Forbes ^ | June 17, 2015 | Thomas Fox-Brewster — Forbes Staff

Posted on 06/17/2015 10:06:37 AM PDT by Swordmaker

It’s become almost axiomatic that Apple AAPL -0.57% devices and the apps on them are more secure than the competition. But researchers continue to blow up that notion and today a group of academics have ripped apart the security protections in Mac OS X and iOS to show it’s not only possible to create malware and get it onto the App Store, but it’s also feasible to launch “devastating” attacks using rogue software to steal the most sensitive personal data around, from iCloud passwords and Evernote notes to dodgy selfies and more.

The attacks, known as unauthorized cross-app resource access or XARA, expose design flaws that allow a bad app to access critical pieces of data in other apps. As a result, Apple has struggled to fix the issues, according to a paper released today from Indiana University Bloomington, Peking University and the Georgia Institute of Technology.

Analysis of 1,612 of the most popular Mac apps and 200 iOS apps found more than 88.6 per cent of the kit using the flawed pieces of the operating systems were exposed to the XARA attacks, leaving all kinds of data out in the open for willing hackers.

(Excerpt) Read more at forbes.com ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS:

1 posted on 06/17/2015 10:06:37 AM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Swordmaker

DEVASTATING!


2 posted on 06/17/2015 10:12:36 AM PDT by sigzero
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I’m guessing the FR AAPL-can-do-no-wrong crowd will be laying low on this one.


3 posted on 06/17/2015 10:20:38 AM PDT by Steely Tom (Vote GOP: A Slower Handbasket)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
Security researchers claim to have found major vulnerabilities in Apple OS X and iOS that permit apps to be able to access passwords and other data through use of Apple's secure keychain as well as breach the sandboxing. They claim the ability to also get iCloud passwords as well. — PING!


Apple Ping!

If you want on or off the Mac Ping List, Freepmail me.

4 posted on 06/17/2015 10:21:02 AM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Steely Tom

Tsk Tsk it’s all a plot by the Evil Bill Gates.


5 posted on 06/17/2015 10:43:49 AM PDT by VRWCarea51 (The original 1998 version)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Steely Tom
I’m guessing the FR AAPL-can-do-no-wrong crowd will be laying low on this one.

Good thing you are here then else Swordmaker would surely cover this one up.

6 posted on 06/17/2015 11:01:06 AM PDT by itsahoot (55 years a republican-Now Independent. Will write in Sarah Palin, no matter who runs. RIH-GOP)
[ Post Reply | Private Reply | To 3 | View Replies]

To: itsahoot
Good thing you are here then else Swordmaker would surely cover this one up.

I do what I can, in my quiet, modest way.

7 posted on 06/17/2015 11:08:47 AM PDT by Steely Tom (Vote GOP: A Slower Handbasket)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker

In the last six months I am starting to see some inventive screen lock up pop ups that the only way out of is to kill the whole Safari browser with a force quit. My wife got one searching doll clothes sites.

Do you think we are going to see a Safari patch that will lock such pop ups out of opening or do you think it is still something that is going to have to get a lot more perverse before it reaches a remedy?


8 posted on 06/17/2015 11:13:42 AM PDT by KC Burke (Ceterum censeo Islam esse delendam)
[ Post Reply | Private Reply | To 1 | View Replies]

To: KC Burke

Screen lock-up pop ups? Not sure I’ve ever seen on - except many years ago on a work Windows machine using Internet Explorer... was a malware attack from a web site.

I’ve seen some pervasive pop-ups, but rarely see any these days. I use Safari’s built-in pop-up controller.


9 posted on 06/17/2015 12:52:42 PM PDT by TheBattman (Isn't the lesser evil... still evil?)
[ Post Reply | Private Reply | To 8 | View Replies]

To: KC Burke
In the last six months I am starting to see some inventive screen lock up pop ups that the only way out of is to kill the whole Safari browser with a force quit. My wife got one searching doll clothes sites.

Those really are not lock ups. . . they are just scores of duplicate windows opened on the same tab using Java script and will not let go until you agree to their ransom ware demands. They will work on Windows machines using a different approach as well. Attempting to close one opens more. But you are right, the way to get out of it is to force quit Safari and then not re-open that page which has a malicious ad on it. The problem is in Java script. An update to Java Script will eventually fix the problem. It is not the website that has any control of it. Google Ads puts the malicious ad on the website. In the meantime, go into Safari preferences and disallow running Java scripts.

10 posted on 06/17/2015 4:29:56 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 8 | View Replies]

To: KC Burke
Do you think we are going to see a Safari patch that will lock such pop ups out of opening or do you think it is still something that is going to have to get a lot more perverse before it reaches a remedy?

Use AdBlocker and that also is effective in preventing this from occurring on all browsers in OS X.

11 posted on 06/17/2015 4:31:09 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 8 | View Replies]

To: itsahoot; Steely Tom
Steely Tom: "I’m guessing the FR AAPL-can-do-no-wrong crowd will be laying low on this one."

Itsahoot: Good thing you are here then else Swordmaker would surely cover this one up.

Sorry I took so long getting back to comment on these claims. While there are some vulnerabilities here, the biggie is the claim that they were able to get iCloud tokens. . . implying that gets them into a user account on iCloud. That is not true.

An iCloud "token" is the handshake ID that is used when Apple's App Store connects to the computer to download software from the App store to assure that the user is legitimate and the iCloud connection are both legitimate.

The iCloud token DOES NOT allow a hacker access to a user's iCloud account data, which the article implies. To access the data in an iCloud account requires the user's iCloud user name and iCloud password which are NOT stored in the Keychain as the iCloud Token is stored. The user's password, which is entangled with the UUID of the device is used to encrypt the data on iCloud and cannot be decrypted by any external computer and must be decrypted on the user's computer.

All these researchers demonstrated was the ability to steal the handshake token that would allow them to download software from Apple or create a Man-in-the-middle server to allow downloading of malicious software onto this single Mac.

However, to accomplish that the Mac had to have malicious software ALREADY downloaded on it to steal the token in the first place.

They were able to poison THEIR Mac's keychain because they already had access to that Mac. However, getting access to poison someone else's Mac's keychain is problematic.

There is the failure point of these vulnerabilities. How do they initiate the exploits? They need to get their poison program onto the Mac to poison the keychain.

The researchers postulate that it would be easy to get malicious software onto Apple's App store. They give no examples of such software ever being posted by Apple. . . and blithely claim that they were able to "post" such malicious apps on Apple's Mac App store. That WILL get each and everyone of them blacklisted for life by Apple now that they have publicly admitted hiding deliberately malicious code in an App. They have actually admitted to a criminal felony by doing such a thing. Frankly, I find that hard to believe because of the difficulty in getting certification for posting Apps on the Mac store. Perhaps it is true, but it would NOT remain there long, once even a few instances of exploits in the wild were reported.

Again, this gets back to letting a TROJAN onto your system to start the daisy chain of exploits. Apple does have to do more in checking the Apps' sub-programs allowed on the App Stores, but I think they are doing a pretty good job now. Finally, don't download Apps from untrusted sources and you will probably be OK.

12 posted on 06/17/2015 5:32:59 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 6 | View Replies]

To: VRWCarea51

+1


13 posted on 06/17/2015 5:43:48 PM PDT by grey_whiskers (The opinions are solely those of the author and are subject to change without notice.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Swordmaker
> Again, this gets back to letting a TROJAN onto your system to start the daisy chain of exploits. Apple does have to do more in checking the Apps' sub-programs allowed on the App Stores, but I think they are doing a pretty good job now. Finally, don't download Apps from untrusted sources and you will probably be OK.

Good sane advice.

This article is too over the top and breathless for me to take at face value. I expect that in time it will either get debunked as at least partially fraudulent, or as you pointed out the researchers will be outed as having done something illegal or at least worthy of lifetime banning.

I dunno... the article just strikes me overall as being quite over-hyped and low on actual import. But your good advice stands.

14 posted on 06/17/2015 8:26:49 PM PDT by dayglored (Meditate for twenty minutes every day, unless you are too busy, in which case meditate for an hour.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: All
Later research on the keychain vulnerability reveals that:

"There is some good news: the Keychain items you already have stored don’t appear to be susceptible to the exploit, only new ones that are created after a malicious app is installed." — The Next Web.Com

15 posted on 06/17/2015 11:37:40 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson