Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Former NSA staffer demonstrates Mac malware that can tap into live webcam and mic feeds
9 to 5 Mac ^ | October 6, 2016 | by Ben Lovejoy

Posted on 10/06/2016 12:26:15 PM PDT by Swordmaker

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-25 last
To: cynwoody; proxy_user
It's called System Integrity Protection. It disallows changes to /System, /sbin, and /usr (except for /usr/local), even via sudo.

To bypass it, you have to boot into Recovery Mode, enter a command to disable SIP, and reboot into Mac OS. Then you can make your changes as root. When you're done, it is recommended to repeat the above steps, this time re-enabling SIP.

That's true. But all UNIX commands are available in ROOT if there is a true ROOT user with a password. You just have to know how to access it and create the ROOT user. Without the activated ROOT user, you use the recovery system you describe to disable SIP.

My understanding System Integrity Protection is a limitation in the SUDO command for the Administrator users levels and below. All bets are off is anyone is stupid enough to be running in ROOT.

If I recall correctly, SIP was created because of a problem with an uncorrectable or intractable USB bus standards flaw where a malicious USB device could bring in a malicious auto-running App where a SUDO command could do untold damage to the system on a Mac running in Administrator user mode. By limiting what SUDO could do, the damage would be limited, but still allows SUDO to do normal system operations.

21 posted on 10/06/2016 7:04:09 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 18 | View Replies]

To: Swordmaker

Well, once a company heads off in this direction, they tend to keep going. Macworld readers are alarmed because they they think this is only the beginning, and that more restrictions will be added in the future.


22 posted on 10/06/2016 7:07:09 PM PDT by proxy_user
[ Post Reply | Private Reply | To 21 | View Replies]

To: proxy_user
Apple says that the root user can be a significant risk factor to the system's security, especially on systems with a single user account on which that user is also the administrator. System Integrity Protection is enabled by default, but can be disabled.[4][5] It was added in OS X El Capitan.

That does not mean it is not fully functional UNIX™ when one needs it to be.

23 posted on 10/06/2016 7:08:56 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 20 | View Replies]

To: proxy_user
Well, once a company heads off in this direction, they tend to keep going. Macworld readers are alarmed because they they think this is only the beginning, and that more restrictions will be added in the future.

There are always "Chicken Littles" willing to run around in circles claiming the sky is falling about almost anything, Proxy. There were a lot of Macworld readers who were panicking, making hyperbolic predictions about how the Mac was going to be turned into a big iPhone clone four or five years ago. It never happened.

There are good and well thought out reasons for locking this attack vector down.

I mentioned the USB bus problem but I also recall that problem also spilled over into Thunderbolt and other port issues. Essentially any usable port had the same early flaw that was a huge problem allowing a malicious actor a means of injecting a sudo command into a UNIX or LINUX operating system running in Administrator mode. This flaw would require re-writing the standards for the bus from the ground up, something that was NOT going to happen until the ports themselves are replaced by a new port someday in the future. There were just too many legacy ports out there to fix on systems too old to update. It would break too much for the risk involved.

24 posted on 10/06/2016 7:23:06 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Swordmaker
But all UNIX commands are available in ROOT if there is a true ROOT user with a password. You just have to know how to access it and create the ROOT user. Without the activated ROOT user, you use the recovery system you describe to disable SIP.

There is only one root user, and, in El Capitan, said root user cannot do certain things without modifying the kernel first:

cynwoody:~$ whoami
cynwoody
cynwoody:~$ python -c "import os;print os.getuid()"
501
cynwoody:~$ sudo bash
Password:
bash-3.2# whoami
root
bash-3.2# python -c "import os;print os.getuid()"
0
bash-3.2# csrutil status
System Integrity Protection status: enabled.
bash-3.2# touch /System/fubar
touch: /System/fubar: Operation not permitted
bash-3.2# csrutil disable
csrutil: failed to modify system integrity configuration. This tool needs to be executed from the Recovery OS.
bash-3.2# exit
exit
cynwoody:~$ whoami
cynwoody
cynwoody:~$ 

I go from cynwoody, uid 501 to root, uid 0, but I still can't create a file in /System, even as root. SIP is on, but I can't turn it off, even as root. Instead, I'm told I have to reboot into the Recovery OS. The SIP status is recorded in NVRAM, and no facility is provided for modifying it, except in the Recovery OS.

However, SIP is enforced by the kernel, and if we can modify the kernel's memory, we can turn it on or off at will. Blogger @osxreverser (Pedro Vilaça) claims to have done it, but his method uses a kernel extension, and those have to be signed, so you need to be an official Apple Developer.

25 posted on 10/06/2016 10:35:47 PM PDT by cynwoody
[ Post Reply | Private Reply | To 21 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-25 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson