Blog

Mac Keychain Bug Could Be Big Problem For Apple

Feb 26, 2019 | Blog

An independent security researcher named Henze has discovered a potentially devastating macOS exploit that’s been dubbed Keychain, and he has posted a video demonstrating it in action. Henze has discovered other vulnerabilities in the past, so Apple was quick to take note. Here’s the problem, though: he’s frustrated that Apple’s Bug Bounty program only applies to bugs found in iOS and doesn’t include macOS.

So, he’s decided not to provide the company with the full details of the newly discovered flaw. Based on the video, we know that the exploit does not require admin privileges, nor does it matter if Access Control Lists have been established.  Rumor has it that it can even defeat a system that has System Integrity Protection enabled.

Apparently, the exploit is capable of accessing anything in both the “login” and “System” keychains, but the iCloud chain is apparently not affected, given that it stores data in a different way.

Apple has made no formal statement about the exploit, so it’s unclear if a fix is in the works. Even if it is, there has been no indication of a timeframe when it might be ready for rollout.

In the meantime, however, users can protect themselves from this type of an attack by locking the login Keychain with an additional password.  This, however, is not the default configuration and is highly inconvenient.

Is it worth it?  The short answer is maybe.  As of now, the exploit has apparently not been used in the wild. Given the presence of the video, it’s incredibly likely that hackers will be able to glean enough information to reproduce it, build an attack around it and begin using it.  How long that takes is anyone’s guess, so in the immediate future, there’s probably no need to worry about it. However, the more time that passes without a fix, such a step might be more worthwhile.

FBI Program Tasked with Infrastructure Security Compromised

FBI Program Tasked with Infrastructure Security Compromised

The FBI program tasked with ensuring critical infrastructure security has been compromised by hackers, who now offer access to the program's data on the dark web. The breach was initially disclosed by Brian Krebs of Krebs on Security, who claims that the data was for...

Streamline Your Business with the Latest Smart Home Technology

Streamline Your Business with the Latest Smart Home Technology

Are you a business owner looking to get the most out of your Google smart home devices? If so, you're in luck! Google has enabled its Nest products and Android OS with the initial rollout of the Matter smart home standard. This means that businesses now have the...

Data Breach at Sequoia One Exposes Sensitive Customer Information

Data Breach at Sequoia One Exposes Sensitive Customer Information

What do you do when your most personal information has been compromised? This is likely the question that customers of Sequoia One asked themselves earlier this month as they were informed that the company had been hacked. Sequoia One specializes in the management of...

Cisco Reports Critical IP Phone Vulnerability

Cisco Reports Critical IP Phone Vulnerability

As a business owner, it's important to stay informed about potential vulnerabilities that could impact your organization. Recently, Cisco reported a critical vulnerability, tracked as CVE-2022-20968, affecting its IP Phone 7800 and 8800 Series. This new vulnerability...

Google Chrome Releases Two New Features

Google Chrome Releases Two New Features

Google Chrome is one of the more commonly used web browsers. Over the years, though, Chrome has gained a reputation for utilizing a large portion of a computer's memory. This can be a problem if you're running other resource-intensive tasks and don't want to slow...

Get a Free Consultation

 

Fill out the form below to receive a free consultation and learn how we can make your technology worry-free!

 

Contact Information

  • 39301 Badger Street, Suite 500
    Palm Desert, CA 9221
  • (760) 333-8523
  • info@icn.tech