Bypass glitch makes Mac OS vulnerable due to improper code-signing implementation Lessupport 15 Jun 2018

Bypass glitch makes Mac OS vulnerable due to improper code-signing implementation

A bypass found in third party developers’ interpretation of code signing API allowed for unsigned malicious code to appear to be signed by Apple. All the third-party vendors have issued patch once they realized that their software was not interacting correctly with the Apple’s code-signing API. Without the patch, attackers can craft malicious code and secretly hide it under the software bypassing the code-signing process, making it appear to be a legitimate code which is approved by Apple.

What is code-signing?

Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. The signed-code is considered as key for whitelisting, antivirus and malware hunting. So once a block of code is signed it is not investigated deeply for any breach or cyber attack.

Okta, which reported the vulns, explained that in macOS, code-signing focuses on Mach-O files, which target a specific native CPU architecture within the Mac ecosystem. The bypass involves a lack of code-signing verification for Mach-O files that are gathered (or “nested”) into the Fat/Universal file format.

“This vulnerability exists in the difference between how the Mach-O loader loads signed code, versus how improperly used code-signing APIs check signed code,” explained Josh Pitts, staff engineer for Research and Exploitation at Okta, in an analysis released on Tuesday.

All the third party vendors had been notified about the above scenario and hence they have taken necessary step to remove the flaw from their code-signing flaws. However, there may still be many third party tools which are still not using code-signing APIs correctly.

 

Related Posts

  • Strengthen Email Security with DMARC: Protect Your Domain from Fraud Post Thumbnail

    Why DMARC Is Essential for Protecting Your Domain from Email Fraud Email continues to be one of the...

  • zatpatmail-dedicated-transactional-email-delivery Post Thumbnail

    The Mission-Critical Inbox: Why Dedicated Transactional Email is a Business Imperative In the digital-first economy, the distance between...

  • Forex Card Fraud Incident Post Thumbnail

    Recent reports of unauthorized international transactions on forex cards issued by Yes Bank in partnership with BookMyForex highlight...

Scroll
Copy link