Safari Error Visiting Web Cameras, Internet Account, and More

[ad_1]
Often bad what happens when you have a lot of open tabs is that you can’t find the one that starts releasing random ads. But the macOS threat group – set up by Apple late last year – would have opened up your Safari tabs and other browsers to hack, and opened the hacker door for them to monitor your online account, turn on your microphone, or take over. on your webcam.
MacOS has built-in security features to protect against this type of attack, including the Gatekeeper, which ensures the authenticity of the program your Mac is running. Koma to break these rounded up the security by misusing the iCloud and Safari formats that macOS already relies on. While investigating possible weaknesses in Safari, independent security researcher Ryan Pickren began looking for a way to share iCloud records due to the trust that exists between iCloud and macOS. When you share an iCloud document with another user, Apple uses a photo sharing program called “ShareBear” to coordinate the transfer. Pickren found that he could use ShareBear to give victims a bad file.
Instead, the file should not be bad at first, making it easy to give victims something compelling and persuasive. Pickren found that thanks to a reliable relationship between Safari, iCloud, and ShareBear, the attacker could view what he had shared with the victim later and quietly turn the file into a nasty one. All of this can happen without the victim receiving instant access from iCloud or realizing that everything has changed.
Once the intruder commits a burglary, he can seize Safari, see what the victim sees, get the accounts that the victim has entered, and the abuse permits the victim has given websites to get a camera and microphone. The attacker can also access other files stored locally on the victim’s Mac.
“The attacker is hacking through a browser,” says Ryan Pickren, a security analyst who revealed the threat to Apple. “So if you log on to Twitter.com on one tab I can skip and do all you can from Twitter.com. But this has nothing to do with servers or Twitter security, I as an attacker are just copying the part you already have in your browser.”
In October, Apple has been updated The threat in Safari’s WebKit engine is the overhaul in iCloud. And in December it was cut off The corresponding threat in Script Editor code automation is a modification tool.
“This is an amazing chain,” said Patrick Wardle, a longtime researcher and founder of the nonprofit macOS Objective-See. “It is prudent that it utilizes design errors and wisely uses macOS technology to evade security measures and disrupt the system.”
Pickren has previously found Safari bugs that may have start downloading webcams. He revealed the news through Apple’s bug bounty program in July and the company paid him $ 100,500. This increase has never been done with Apple’s disclosure program, but it does highlight the seriousness of the errors. In 2020, for example, the company paid $ 100,000 due to a major problem in Sign In With Apple single sign-on system.
Safari and Webkit, however, have a other security concerns, because they are big towers. And Apple has had a difficult time find a handle in trouble, even when weaknesses appear for weeks or months.
[ad_2]
Source link



