{"id":15064,"date":"2015-05-06T15:31:02","date_gmt":"2015-05-06T15:31:02","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=3919"},"modified":"2020-02-26T11:01:40","modified_gmt":"2020-02-26T16:01:40","slug":"mac-os-x-a-security-recap","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/mac-os-x-a-security-recap\/15064\/","title":{"rendered":"Mac OS X: a security recap"},"content":{"rendered":"<p>For years, Mac OS X has had a great reputation as a secure system, almost completely unaffected by the cyber threats plaguing other operating systems (mostly Windows, of course). But is it really as impervious as people think? Putting aside the question of price, can one say that replacing a business\u2019s Windows-based PCs with Macs is a total solution to the cyber threat issue? Well, let\u2019s take a closer look.<\/p>\n<p><strong>Less interesting, but not ignored <\/strong><\/p>\n<p>Launching early in 2001, Mac OS X has been highly regarded as a system unaffected by the multiple problems afflicting the Windows family in the late 1990s and early 2000s. At the time, Windows (95, 98, 2000, NT, then Windows XP) had been taking over the world with authority, becoming the most popular\/widely used OS around the globe. Most of the PC manufacturers produced Intel-based machines capable of running the existing versions of this OS.<\/p>\n<p>Apple adopted a different policy: for a long time Mac OS X could only be launched on Macs- personal computers produced exclusively by Apple. Mac OS X was not supposed to be licensed to a third party.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Mac OS X: a security recap #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FTty4&amp;text=Mac+OS+X%3A+a+security+recap+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Macs were, and continue to be, much less popular among the end-users than Windows-based machines for several reasons, starting with their pretty high price tag. However, Macs are a great tool for working with multimedia, and, as Mac-lovers would say, are very superior to Windows in many ways, making Mac OS X less interesting to black hats (i.e., cyber criminals). Mac OS X was never targeted when cyber vandalism was common, and even now, Macs are secondary targets to cybercriminals looking to profit.<\/p>\n<p>But \u201csecondary\u201d doesn\u2019t mean ignored. Especially because Mac OS X\u2019s \u201csecure\u201d reputation leaves the end-user less likely to implement extra defenses.<\/p>\n<p><strong>Security features<\/strong><\/p>\n<p>Late last year we <a href=\"https:\/\/business.kaspersky.com\/security-features-in-mac-os-x-yosemite\/2798\" target=\"_blank\" rel=\"noopener nofollow\">posted about the security features in the then-new Mac OS X Yosemite<\/a> (version 10.10). Apple stated that security was, \u201cThe first thought. Not an afterthought.\u201d A motto to be lauded these days.<\/p>\n<p>But five and a half months later, a security researcher (Patrick Wardle from Synack) claimed that all of the Mac OS X protections are quite simple to bypass, and that gaining access to a Mac as an attacker isn\u2019t much of a challenge at all. Actually it is trivial: for instance, Gatekeeper doesn\u2019t verify any extra content in Apple apps, so by tricking an Apple-approved app into loading external content, one can smuggle potentially harmful content past Gatekeeper.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/05\/06020322\/wide-1.jpg\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-3923\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2015\/05\/06020322\/wide-1.jpg\" alt=\"wide\" width=\"1000\" height=\"455\"><\/a><\/p>\n<p>Again, the researcher said by simply recompiling a known piece of OS X malware, which changes the hash, he could get the malware past XProtect and unleash it onto the machine. Even easier, he could simply change the name of the malware, which also allows it to sneak in under the fence. Sounds bad.<\/p>\n<p>More data on this is <a href=\"https:\/\/threatpost.com\/bypassing-os-x-security-tools-is-trivial-researcher-says\/112410#sthash.1ZnXuKt3.dpuf\" target=\"_blank\" rel=\"noopener nofollow\">available at Threatpost<\/a>. In a nutshell, it looks like Mac OS X security features are poorly implemented.<\/p>\n<p>How exploitable the above flaws are is a different question, however, but regardless, these mistakes are serious and hopefully they will be fixed ASAP.<\/p>\n<p><strong>Real-world issues<\/strong><\/p>\n<p>While Mac OS X is considered to be much more secure than Windows, it is NOT impenetrable, and IS affected by malware, even though this problem has never been as massive as with Microsoft\u2019s OS.<\/p>\n<p>Still, for instance, in 2012 more than 700k Macs were <a href=\"https:\/\/www.kaspersky.com\/about\/press\/major_malware_outbreaks\/flashback-mac\" target=\"_blank\" rel=\"noopener nofollow\">reported<\/a> as infected by a Flashfake Trojan \u2013 at the time it was the largest Mac OS X malware outbreak ever.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Mac OS X malware is less of a problem than that for Windows, but it\u2019s not non-existing. #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FTty4&amp;text=Mac+OS+X+malware+is+less+of+a+problem+than+that+for+Windows%2C+but+it%26%238217%3Bs+not+non-existing.+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Late last year researchers nailed down a WireLurker malware family that was attacking and infecting both Mac OS X and iOS devices. In early November 2014, C&amp;C infrastructure of the WireLurker was blasted, while Apple revoked a legitimate digital certificate used to sign WireLurker code and allow it to infect non-jailbroken iOS devices. Details on the operation are available <a href=\"https:\/\/threatpost.com\/wirelurker-mac-os-x-malware-shut-down\/109204#sthash.HpOoenTN.dpuf\" target=\"_blank\" rel=\"noopener nofollow\">via this link<\/a>.<\/p>\n<p>In early January this year yet another security researcher came out <a href=\"https:\/\/threatpost.com\/first-public-mac-os-x-firmware-bootkit-unleashed\/110287\" target=\"_blank\" rel=\"noopener nofollow\">with the first public concept for a Mac OS X Firmware bootkit<\/a> codenamed Thunderstrike. By exploiting a Mac OS X vulnerability, once successfully implemented and installed, it would resist cleanup and give hackers persistent, stealthy control over a compromised Mac. An APT guys dream. Apple responded with a 10.10.2 combo update <a href=\"https:\/\/threatpost.com\/thunderstrike-patch-slated-for-new-os-x-build\/110649\" target=\"_blank\" rel=\"noopener nofollow\">fixing this bug along with several others<\/a>.<\/p>\n<p>In March, Patrick Wardle <a href=\"https:\/\/threatpost.com\/stealthy-persistent-dll-hijacking-works-against-os-x\/111661\" target=\"_blank\" rel=\"noopener nofollow\">talked to Threatpost about DLL hijacking<\/a>, an attack that had plagued Windows machines as far back as 2000; now it works with Mac OS X as well.<\/p>\n<p>Wardle said, among other things, that this style of attack is also perfect for prolonging hackers\u2019 persistence in infected machines.<\/p>\n<p>On April 8th, Apple delivered yet another monster batch of security patches for OS X (and iOS) eliminating 80 bugs in Yosemite. Among them \u2013 a Rootpipe backdoor bug in OS X Admin framework (still affecting Mac OS X 10.9 and below \u2013 <a href=\"https:\/\/threatpost.com\/older-versions-of-os-x-remain-vulnerable-to-rootpipe-hidden-backdoor-api\/112105\" target=\"_blank\" rel=\"noopener nofollow\">Apple decided not to backport the fix<\/a>), a Darwin Nuke bug that allows attackers to remotely crash Apple devices, <a href=\"https:\/\/threatpost.com\/details-disclosed-on-darwin-nuke-bug-in-os-x-ios\/112128\" target=\"_blank\" rel=\"noopener nofollow\">which was discovered and reported to Apple by Kaspersky Lab researchers<\/a>, kernel bugs, code execution, privilege escalation, denial of service vulnerabilities, etc.<\/p>\n<p>A relatively healthy number of bugs, introduced by the inevitable mistakes of human code writers, were fixed. Errare humanum est (to err is human).<\/p>\n<p><strong>Good, improving, non-impervious<\/strong><\/p>\n<p>Overall, there is a lot going on with Mac OS X. This post isn\u2019t about smearing the good, evolving system that is Apple\u2019s Mac OS X. The goal was to bring perception and reality together: just like the other operating systems, Mac OS X has its fair share of bugs, and while the historically smaller Mac user base has resulted in less cyber criminal targeting, it doesn\u2019t make Mac OS X impervious. Macs\u2019 user base has been growing steadily over the last few years, and criminal interest is following the same pattern.<\/p>\n<p>At least five known APT campaigns targeting Mac OS X, along with other platforms, <a href=\"https:\/\/apt.securelist.com\/#secondPage\/platforms=5\" target=\"_blank\" rel=\"noopener\">have been discovered so far<\/a>, with two of them still active. Perhaps more will arrive with time.<\/p>\n<p>So, in fact, Mac OS X-based machines do require extra protection, despite their \u201csecure\u201d reputation.<\/p>\n<p>Kaspersky Lab\u2019s business products \u2013 both <a href=\"https:\/\/www.kaspersky.com\/business-security\/endpoint-mac\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security<\/a> and <a href=\"https:\/\/www.kaspersky.com\/small-office-trial?redef=1&amp;reseller=blog_b2b_en-global\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Small Office Security<\/a> \u2013 protect Mac OS X from every kind of modern and future IT security threat for long-term reassurance. Both current and legacy versions of the operating system are supported.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This post isn\u2019t about smearing the good, evolving system that is Apple\u2019s Mac OS X. The goal was to bring perception and reality together: just like the other operating systems, Mac OS X has its fair share of bugs, and while the historically smaller Mac user base has resulted in less cyber criminal targeting, it doesn\u2019t make Mac OS X impervious. Macs\u2019 user base has been growing steadily over the last few years, and criminal interest is following the same pattern.<\/p>\n","protected":false},"author":209,"featured_media":15685,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[1946,97],"class_list":{"0":"post-15064","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-macos","10":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mac-os-x-a-security-recap\/15064\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mac-os-x-a-security-recap\/15064\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mac-os-x-a-security-recap\/15064\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/macos\/","name":"macOS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15064"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15064\/revisions"}],"predecessor-version":[{"id":33517,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15064\/revisions\/33517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15685"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}