Mac OS X Lion Password Vulnerability: Sleep Mode

  /     /     /  
Publicated : 22/11/2024   Category : security


Mac OS X Lion Password Vulnerability: Sleep Mode


Forensic software can exploit a seven-year-old FireWire design error to snoop system memory for passwords, even for devices that are locked or in sleep mode.



Updated forensic software can steal Apple OS X login passwords in minutes, even when the devices are locked or asleep.
To be successful, however, users of the software, Passware Kit Forensic v11, must have physical access to the target Mac device, as well as a FireWire cable connection. At that point, the software can capture the password data from the Macs memory, even on the latest version of Apples operating system,
Mac OS X Lion
.
According to Passware, its $995 software kit only takes a few minutes to work. It also functions regardless of password strength, and even if FileVault encryption has been activated. Passware previously implemented the same technique to decrypt Windows hard disks encrypted with BitLocker and TrueCrypt, with software running on a USB key that is plugged into the target machine.
Interestingly, the potential vulnerability--as Passware described it--in Apple OS X that enables password extraction is in many ways also a documented FireWire feature. One of the design features of FireWire, and part of what makes it attractive for professional use, is that it allows for [direct memory access], a technology used in modern computers which allows peripherals to bypass the CPU and directly read from and write to memory, said Aryeh Goretsky, a distinguished researcher at ESET, in a
blog post
. Because the processor does not have to manage the data transfer, higher data rates, and lower CPU utilization can be ensured, while leaving the CPU available to perform other functions.
Security researchers first identified the underlying FireWire design error in 2004, he said, though it was largely ignored until an authentication bypass attack on Windows XP and (with some modification) the then-new Windows Vista operating system, emerged in 2008.
Stealing passwords isnt all thats possible via FireWire. In February 2011, for example, computer security firm HBGary partnered with defense contractor General Dynamics on a project named Task B to install rootkits onto computers by writing them directly into a computers memory, he said, referencing an
Ars Technica
story.
As a data transfer technology, FireWire has already been well eclipsed by the less expensive USB 2.0. Many Apple devices--including the MacBook and MacBook Air--now ship with no FireWire port. In fact, Apple is now putting its weight behind
Thunderbolt
, a connection technology that offers roughly twice the speed of USB 3.0, and 12 times the speed of FireWire 800.
For Apple computers that do have a FireWire port, and owners who fear their machines will be hacked via forensic software and an attacker who has the required physical access to the machine, heres an easy mitigation strategy: always turn off the computer instead of putting it to sleep, and deactivate the automatic login setting, which will prevent the computer from fully booting until a password has been entered. This way, passwords will not be present in memory and cannot be recovered, according to Passware. Such a log-in password will already be required for any users who have activated Lions built-in
whole-disk encryption
feature, FileVault 2.
Another mitigation strategy is to disable FireWire, if you have no devices that use the port, said Goretsky. Or, even more simply, dont leave your computer alone in an unsafe location. While the chance of a password theft or rootkit injection via FireWire is likely quite low, theres a much higher probability of its being stolen the old-fashioned way.
In other Apple-related forensic software update news, on Monday, Russian forensic software maker Elcomsoft announced that its
iOS Forensic Toolkit
has been updated to support Windows, and includes the ability to decrypt keychain data--used to store sensitive information--for all devices running iOS 3.x, and most that run iOS 4.x, using brute-force recovery if necessary.
The iOS Forensic Toolkit can also be used to obtain an image of an iPhone, iPad, or iPod Touch device--provided the softwares user has physical access to the device--and decrypt these images. As a result, it allows one to obtain a fully usable image of the devices file system with the contents of each and every file decrypted and available for analysis, said Andrey Belenko a security researcher at Elcomsoft, in a
blog post
.
The update also allows for logging of all activities occurring while the toolkit is running, he said, which was a feature requested by multiple law enforcement agency users.
Security concerns give many companies pause as they consider migrating portions of their IT operations to cloud-based services. But you can stay safe in the cloud. In this Dark Reading Tech Center report, we explain the risks and guide you in setting appropriate cloud security policies, processes and controls.
Read our report now
. (Free registration required.)

Last News

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Mac OS X Lion Password Vulnerability: Sleep Mode