Apple OS X Vulnerability: Advanced Persistent Attacks

  /     /     /  
Publicated : 22/11/2024   Category : security


Apple OS X Vulnerability: Advanced Persistent Attacks


Macs are even easier to exploit than Windows via advanced persistent threats, warn security researchers.



(click image for larger view)
Slideshow: Building The Mac Office
Many people see Apple OS X as being free from the security challenges facing Windows PCs. But researchers speaking on Wednesday at Black Hat, a UBM TechWeb event, in Las Vegas, said Macs are quite susceptible to advanced persistent threat (APT) attacks, which favor espionage over outright data exploitation.
A number of our clients have made the decision to switch to Macs based on the fact that these APT technologies dont target them, said Alex Stamos, co-founder and CTO of iSEC Partners. But in fact, he said, while the specific types of attacks may differ, Macs are arguably even more vulnerable to APTs than Windows PCs, since many Mac-specific technologies are quite easy to exploit.
Are attackers actually gunning for Macs? Thankfully, aside from fake AV, such as
Mac Defender
, the answer is largely no. There are no crime packs that are popular that target Mac OS X, said Paul Youn, a senior security consultant at iSEC Partners. Thats likely because Apples market share is only about 6%, meaning that if attackers want to compromise a large number of computers at once, they typically target Windows.
Even so, Stamos recommends treating Macs with care, since theyre relatively easy to exploit. Notably, he said, there are pervasive authentication issues in OS X, and that its easy to exploit two of the most widely used protocols for managing Macs, including AFP (aka Apple Filing Protocol), as well as Bonjour, a service delivery protocol Macs use to connect to servers. In particular, its relatively easy to substitute a malicious server for a fake one and then force users to connect. These vulnerabilities could serve as a foundation for launching APTs against Macs.
Terminology-wise, of course, the APT is a
somewhat fuzzy concept
. Generally, security experts define an APT as threat involving attackers who can launch multiple exploits, advancing the underlying functionality along the way, all to support espionage efforts. The advanced part doesnt mean that every attack is advanced, but rather that attackers are willing to upgrade their attack capabilities, said Stamos. It just means people have the ability to turn the knob up on the advanced scale.
By definition, after gaining a foothold in an organizations network, APTs also persist. On Apple OS X, ways to persist include modifying startup items or the underlying operating system code. In addition, said BJ Orvis, a security researcher and consultant at iSEC Partners, you could theoretically write a malicious script just using AppleScript, which is fun. Regardless of the technique used, persistence enables attackers to surreptitiously monitor the network and expand the attack over time. For example, they may compromise directory servers to steal and crack large numbers of passwords offline.
What can companies do to mitigate APTs? Regardless of operating system, I would strongly suggest you log all of your DNS requests across the enterprise, said Stamos. Next, maintain a top 10 list of all dynamic DNS requests. If you see 40 different machines doing hundreds and hundreds of identical dynamic DNS requests, he said, and its to an unknown host, then suspect that theyre communicating with a
botnet command and control network
.
Also put policies in place to automatically block unusual, large-scale data egress. Thats because attackers, after infiltrating a network, may then wait to copy a large amount of data from the network. One favored technique is doing this after hours or during holidays, when personnel may not be present to manually block the data transfer. Accordingly, he said, organizations should coordinate egress restrictions in all offices.
For organizations that want to specifically protect Macs against APTs, however, expect challenges. Notably, while there are well-known disk forensic products--including Guidance EnCase and BlackLight--the problem is the disk forensics isnt how you fight APT anymore, said Stamos. If you say that this machine is doing funny DNS requests, Im going to pull it off the network and do disk forensics, well thats an 18-hour process, thats not a fast enough process to deal with these types of attacks. In fact, attackers may notice the missing machine, if not read actual stolen emails about hiring a forensics expert, and thus change their approach.
Instead, whats required is memory-based forensics, as offered by such products as Mandiant Memoryze, HBGary Active Defense, and Responder Pro. Except, those tools only work on Windows; none yet exist for Macs. Help could be on the way: Stamos said new Mac tools are in the works, and as with the recently publicized ability to
pull Mac passwords from memory via FireWire
, Thunderbolt connection technology should also provide forensic investigators with useful forensic capabilities. But theres nothing available today.
With all of the above in mind, Stamos recommends using Macs with caution, and only giving them access to some network resources. We use Macs on our network, he said. We treat them as I recommend you treat them--as little islands in a hostile network. Accordingly, his company also installs a 64-bit Windows 7 partition to give Mac users access to certain functionality, such as SharePoint.
Furthermore, security-conscious organizations should avoid using Mac OS X Server altogether, he said. Notably, a default Snow Leopard Server (10.6) contains 28 open network ports by default, as well as a number of other security vulnerabilities. Once you install OS X server, youre toast, he said.
Read our report on how to guard your systems from a SQL attack.
Download the report now
. (Free registration required.)

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Apple OS X Vulnerability: Advanced Persistent Attacks