Feedback & Followups
- 🇺🇸 A graphic illustration of how real the danger of tech company subpoenas is in a post-Roe America: This Is the Data Facebook Gave Police to Prosecute a Teenager for Abortion — www.vice.com/… (Facebook had private messages to hand over because while Messenger can do-end-to-end encryption, it doesn’t do it by default!)
- Two timely AirTag reminders
- Apple explicitly advertise AirTags as being for recovering lost items, they are absolutely positively not intended to track stolen items (otherwise they wouldn’t make noise to attract attention to themselves for a start!). Not only are they designed to reveal themselves to thieves, if you find the thief quickly enough to avoid that, you could also get badly hurt, so don’t use AirTags to track down thieves yourself: Robbery victim tracks thief with AirTag, gets broken nose — appleinsider.com/…
- Don’t ignore AirTag warnings, and notice that Apple’s safeguards are working: Man jailed for stalking ex-girlfriend with an AirTag — appleinsider.com/…
- Leaked screenshots reveal Pegasus spyware features, including reading WhatsApp messages, activating a phone’s microphone, and recording incoming or outgoing calls — appleinsider.com/…
- 🇫🇷 Three large French publishers join the chorus of miss-guided lawsuits claiming that requiring apps to ask for permission to track (Apple’s App Tracking Transparency) is anti-competitive — www.macobserver.com/…
- Apple followed through on their promise to clean up their app store and remove abandoned apps: Apple pulled a record 439K apps in Q2, including abandonware — appleinsider.com/…
- Yet another attempted software supply-chain attack, but it was very quickly cleaned up by Microsoft: GitHub blighted by “researcher” who created thousands of malicious projects — nakedsecurity.sophos.com/…
Deep Dive 1 — Malware in the Mac App Store
News broke this week that threat actors managed to sneak malware into Mac AppStore apps using a kind of time-bomb feature where the apps were benign until after they were reviewed, and then they changed their behaviour to become malicious. All the apps affected offered real functionality, otherwise, they’d not have made it through review, but then they developed some nasty side effects. It’s not clear how this is possible, but statements from Apple imply that the apps completely changed functionality after passing review. I don’t quite understand how that would work, but I sure hope Apple figure out how to nip that behaviour in the bud!
The most high-profile app was one for managing Facebook ad buys which hijacked Facebook accounts so the attackers could run their ads on the victim’s dime. According to Apple this app was originally a document manager and passed review as such, but then transformed into an app for managing Facebook ads, and managed to become very highly rated as such on the Mac AppStore.
This suggests to me that app updates don’t get sanity checked by a human anymore, otherwise, you’d imagine the reviewer would notice the dramatic pivot and send the app off for deeper review again. That’s just a guess though.
Another researcher, Alex Kleber, reported finding seven malicious apps which had used this morphing technique to bypass the review process. Again, these apps offered legitimate functionality (mostly PFD & Word related), but accepted commands from remote servers and tried to trick users into paying for expensive subscriptions. The research was vouched for by Patrick Wardle, so it seems legitimate. These apps had a lot of downloads, so this was not a niche problem. You’ll find the list of apps in the Medium post linked below.
Perhaps the most worrying thing about all of this is that Facebook say they notified Apple about the malicious ad manager in mid-July, but Apple did not act until asked for comment by Business Insider last week. It seems the bad guys have found a weakness in Apple’s process, and they’re actively exploiting it. The best we can hope for is that Apple close the loophole down ASAP!
Assuming Apple are able to adjust their process, it’s important not to lose sight of the fact that even with these 8 malicious apps making it into the store, Apple’s walled garden remains a lot safer than the general internet!
Links
- Apple Removes App That Could Hijack Facebook Ad Accounts — www.macobserver.com/…
- Fraudulent Chinese Apps Elude Apple’s Strict Mac App Store Review Process — www.macobserver.com/…
- Investigation report about the abuse of the Mac Appstore — privacyis1st.medium.com/… (lists the 7 apps found)
Deep Dive 2 — The Traffic Light Protocol Gets an Update
If you work in IT in any organisation that has relationships with other organisations (i.e. if you work in just about any organisation), there will be times when sensitive information needs to be shared about some kind of cybersecurity risk or incident. In these kinds of situations, it’s important that everyone knows how widely that information should be shared. Each organisation could develop its own rules, but that would result in chaos, especially when messages need to go between organisations, so, the FIRST (the Forum of Incident Response and Security Teams) have developed a very simple standard that’s very widely used — the Traffic Light Protocol, or TLP. That protocol just moved from version 1 to version 2, so now seems like a good time to share this important piece of knowledge with the community.
Firstly, you’ll recognise emails as being under the Traffic Light Protocol because their subjects will be pre-fixed with TLP
and a colour. As of now, there are five colours (stretching the definition a little!):
- TLP: CLEAR (formerly TLP: WHITE) — the information can be freely shared, even publicly
- TLP: GREEN — the information can be shared freely within the cyber security community, but not publicly (you can’t Tweet or blog about it!)
- TLP: AMBER — the information can only be shared within your organisation, including with contractors/vendors/customers
- TLP: AMBER+STRICT (new) — the information can only be shared within your organisation, not including contractors/vendors/customers
- TLP: RED — the information can only be shared between explicitly specified recipients.
Links
❗ Action Alerts
- Last Tuesday was Patch Tuesday, and there were important updates from Microsoft — krebsonsecurity.com/… (The worst of the bugs affects self-hosted Exchange servers, but everyone should patch their systems ASAP)
- The Zoom installer let a researcher hack his way to root access on macOS — www.theverge.com/…
Worthy Warnings
- In-App Browsers Used by Companies Like Instagram and Facebook Are Massive Privacy Risk Warns Developer — www.macobserver.com/…
- The email from Slack to reset passwords is legit — appleinsider.com/… & Slack admits to leaking hashed passwords for five years — nakedsecurity.sophos.com/…
- Beware of this new tactic being deployed by iPhone thieves to try trick victims into removing activation lock: Do not remove iCloud Lock from a stolen iPhone, because a thief asks you to — appleinsider.com/…
Notable News
- Proof that the long drawn-out NIST process is working as intended, with candidates getting well tested before the standard gets finalised: Post-quantum cryptography – new algorithm “gone in 60 minutes” — nakedsecurity.sophos.com/…
- Security researchers have found a bug they’ve named ÆPIC which can leak the data in Intel’s secure-enclave-like SGX feature. This is potentially a big problem in the corporate world, but it’s not likely to affect home users — nakedsecurity.sophos.com/…
- 🇦🇺 Australia fines Google $40 million over location tracking on Android — appleinsider.com/…
- 🇺🇸 The US Federal Elections Commission has approved a proposal from Google that will allow political campaigns in the US to bypass the GMail spam filter — www.macobserver.com/…
- 🇺🇸 FTC will begin exploring new regulations on data privacy, corporate surveillance — appleinsider.com/…
Interesting Insights
- 2021 Top Malware Strains — www.cisa.gov/…
- Ad Tech Revenue Statements Indicate Unclear Effects of App Tracking Transparency — pxlnv.com/…
- With iRobot acquisition, Amazon wants to scan every inch of your home — appleinsider.com/…
Just Because it’s Cool 😎
Palate Cleansers
Legend
When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by Bart.
Emoji | Meaning |
---|---|
🎧 | A link to audio content, probably a podcast. |
❗ | A call to action. |
flag | The story is particularly relevant to people living in a specific country, or, the organisation the story is about is affiliated with the government of a specific country. |
📊 | A link to graphical content, probably a chart, graph, or diagram. |
🧯 | A story that has been over-hyped in the media, or, “no need to light your hair on fire” 🙂 |
💵 | A link to an article behind a paywall. |
📌 | A pinned story, i.e. one to keep an eye on that’s likely to develop into something significant in the future. |
🎩 | A tip of the hat to thank a member of the community for bringing the story to our attention. |
[…] Security Bits — 14 August 2022 […]