Skip to main content

Researchers showed remote style hack for new Macs








Researchers showed remote style hack for new Macs






mac


Credit: CC0 Public Domain

What could be a happier moment? You starting work with the setup process of a brand new Mac.






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-2'); );



What could be an unhappier moment? You starting work with the setup process of a brand new Mac.


Excuse the quiz writers for puzzling over an answer key, as news unfolds that hacking would be possible via Apple's enterprise hardware management setup tools.


The result would be gaining remote access to the Mac.


It appeared that the new Mac could be compromised even before the user were to take it out of the box.


The researchers' findings were discussed at the recent Black Hat USA 2018 in Las Vegas. Jesse Endahl, chief security officer of Apple device management firm Fleetsmith, and Max Bélanger, a staff engineer at Dropbox, were at the show to explain their findings.


"We found a bug that allows us to compromise the device and install malicious software before the user is ever even logged in for the very first time," Endahl said, in Cult of Mac.


What's it all about?


Simply put, the mischief maker can construct, as Mikey Campbell in AppleInsider wrote, " a man-in-the-middle attack that downloads malware or other malicious software before a client logs in to a new Mac for the first time."


The "enterprise tools" involved and being talked about at length are the Device Enrollment Program and Mobile Device Management platform.


"The attack takes advantage of enterprise Macs using Apple's Device Enrollment Program (.pdf) and its Mobile Device Management platform," said Buster Hein at Cult of Mac. "The enterprise tools allow companies to completely customize a Mac shipped to an employee straight from Apple. However, a flaw in the system allows attackers to put malware on the Macs remotely."


These very tools work in tandem so that companies can look forward to easy IT setup regimens in deploying a large number of devices to their workers, said AppleInsider.


As Wired also said, "The idea is that a company can ship Macs to its workers directly from Apple's warehouses, and the devices will automatically configure to join their corporate ecosystem after booting up for the first time and connecting to Wi-Fi."






(adsbygoogle = window.adsbygoogle || ).push();



And that advantage would make sense for businesses where some of the workforce are in a satellite office or working from their homes.


A Black Hat conference briefing item on the same said, "Our talk walks through the various stages of bootstrapping, showing which binaries are involved, the IPC flows on the device, and evaluates the network (TLS) security of key client/server communications. We will follow with a live demo showing how a nation-state actor could exploit this vulnerability such that a user could unwrap a brand new Mac, and the attacker could root it out of the box the first time it connects to WiFi."


Hein in Cult of Mac went on to explain that "when enterprise Macs use MDM [Mobile Device Management] to see which apps to install off the Mac App Store, there is no certificate pinning to verify the manifest's authenticity. Hackers could use a man-in-the-middle exploit to install malicious apps to access data. Making matters worse, the flaw could be used to hack an entire company's computers."


Campbell also looked at "certificate pinning," which is intended to authenticate web servers through the configuration process. "In particular, the researchers found a bug in Apple's MDM sequence that, when the process hands the machine over to the Mac App Store, fails to complete pinning to confirm the authenticity of an app download manifest, the report said. The hole provides an opportunity for hackers to install malicious code on a target Mac remotely and without alerting the end user."


Lily Hay Newman referred to "certificate pinning" in Wired as "a method of confirming that particular web servers are who they claim."


A problem during one step was spotted by the researchers. "When MDM hands off to the Mac App Store to download enterprise software, the sequence retrieves a manifest for what to download and where to install it without pinning to confirm the manifest's authenticity."


Endahl said in his company 's news release that "under the hood, the DEP and MDM implementations involve many moving parts, and the bootstrapping process exposes vulnerabilities when a device is brought to a fully-provisioned state."


Apple's response? According to reports, Apple addressed the issue when notified by the researchers, in that the vulnerability was patched in macOS High Sierra 10.13.6.





Explore further:
Apple withdraws some China apps after malware found








33 shares











feedback
feedback to editors













add to favoritesemail to friendprintsave as pdf










googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-1'); );






User comments









Please sign in to add a comment.
Registration is free, and takes less than a minute.
Read more
















Click here to reset your password.

Sign in to get notified via email when new comments are made.


















Researchers showed remote style hack for new Macs






mac


Credit: CC0 Public Domain

What could be a happier moment? You starting work with the setup process of a brand new Mac.






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-2'); );



What could be an unhappier moment? You starting work with the setup process of a brand new Mac.


Excuse the quiz writers for puzzling over an answer key, as news unfolds that hacking would be possible via Apple's enterprise hardware management setup tools.


The result would be gaining remote access to the Mac.


It appeared that the new Mac could be compromised even before the user were to take it out of the box.


The researchers' findings were discussed at the recent Black Hat USA 2018 in Las Vegas. Jesse Endahl, chief security officer of Apple device management firm Fleetsmith, and Max Bélanger, a staff engineer at Dropbox, were at the show to explain their findings.


"We found a bug that allows us to compromise the device and install malicious software before the user is ever even logged in for the very first time," Endahl said, in Cult of Mac.


What's it all about?


Simply put, the mischief maker can construct, as Mikey Campbell in AppleInsider wrote, " a man-in-the-middle attack that downloads malware or other malicious software before a client logs in to a new Mac for the first time."


The "enterprise tools" involved and being talked about at length are the Device Enrollment Program and Mobile Device Management platform.


"The attack takes advantage of enterprise Macs using Apple's Device Enrollment Program (.pdf) and its Mobile Device Management platform," said Buster Hein at Cult of Mac. "The enterprise tools allow companies to completely customize a Mac shipped to an employee straight from Apple. However, a flaw in the system allows attackers to put malware on the Macs remotely."


These very tools work in tandem so that companies can look forward to easy IT setup regimens in deploying a large number of devices to their workers, said AppleInsider.


As Wired also said, "The idea is that a company can ship Macs to its workers directly from Apple's warehouses, and the devices will automatically configure to join their corporate ecosystem after booting up for the first time and connecting to Wi-Fi."






(adsbygoogle = window.adsbygoogle || ).push();



And that advantage would make sense for businesses where some of the workforce are in a satellite office or working from their homes.


A Black Hat conference briefing item on the same said, "Our talk walks through the various stages of bootstrapping, showing which binaries are involved, the IPC flows on the device, and evaluates the network (TLS) security of key client/server communications. We will follow with a live demo showing how a nation-state actor could exploit this vulnerability such that a user could unwrap a brand new Mac, and the attacker could root it out of the box the first time it connects to WiFi."


Hein in Cult of Mac went on to explain that "when enterprise Macs use MDM [Mobile Device Management] to see which apps to install off the Mac App Store, there is no certificate pinning to verify the manifest's authenticity. Hackers could use a man-in-the-middle exploit to install malicious apps to access data. Making matters worse, the flaw could be used to hack an entire company's computers."


Campbell also looked at "certificate pinning," which is intended to authenticate web servers through the configuration process. "In particular, the researchers found a bug in Apple's MDM sequence that, when the process hands the machine over to the Mac App Store, fails to complete pinning to confirm the authenticity of an app download manifest, the report said. The hole provides an opportunity for hackers to install malicious code on a target Mac remotely and without alerting the end user."


Lily Hay Newman referred to "certificate pinning" in Wired as "a method of confirming that particular web servers are who they claim."


A problem during one step was spotted by the researchers. "When MDM hands off to the Mac App Store to download enterprise software, the sequence retrieves a manifest for what to download and where to install it without pinning to confirm the manifest's authenticity."


Endahl said in his company 's news release that "under the hood, the DEP and MDM implementations involve many moving parts, and the bootstrapping process exposes vulnerabilities when a device is brought to a fully-provisioned state."


Apple's response? According to reports, Apple addressed the issue when notified by the researchers, in that the vulnerability was patched in macOS High Sierra 10.13.6.





Explore further:
Apple withdraws some China apps after malware found








33 shares











feedback
feedback to editors













add to favoritesemail to friendprintsave as pdf










googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-1'); );






User comments









Please sign in to add a comment.
Registration is free, and takes less than a minute.
Read more
















Click here to reset your password.

Sign in to get notified via email when new comments are made.













Researchers showed remote style hack for new Macs






mac


Credit: CC0 Public Domain

What could be a happier moment? You starting work with the setup process of a brand new Mac.






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-2'); );



What could be an unhappier moment? You starting work with the setup process of a brand new Mac.


Excuse the quiz writers for puzzling over an answer key, as news unfolds that hacking would be possible via Apple's enterprise hardware management setup tools.


The result would be gaining remote access to the Mac.


It appeared that the new Mac could be compromised even before the user were to take it out of the box.


The researchers' findings were discussed at the recent Black Hat USA 2018 in Las Vegas. Jesse Endahl, chief security officer of Apple device management firm Fleetsmith, and Max Bélanger, a staff engineer at Dropbox, were at the show to explain their findings.


"We found a bug that allows us to compromise the device and install malicious software before the user is ever even logged in for the very first time," Endahl said, in Cult of Mac.


What's it all about?


Simply put, the mischief maker can construct, as Mikey Campbell in AppleInsider wrote, " a man-in-the-middle attack that downloads malware or other malicious software before a client logs in to a new Mac for the first time."


The "enterprise tools" involved and being talked about at length are the Device Enrollment Program and Mobile Device Management platform.


"The attack takes advantage of enterprise Macs using Apple's Device Enrollment Program (.pdf) and its Mobile Device Management platform," said Buster Hein at Cult of Mac. "The enterprise tools allow companies to completely customize a Mac shipped to an employee straight from Apple. However, a flaw in the system allows attackers to put malware on the Macs remotely."


These very tools work in tandem so that companies can look forward to easy IT setup regimens in deploying a large number of devices to their workers, said AppleInsider.


As Wired also said, "The idea is that a company can ship Macs to its workers directly from Apple's warehouses, and the devices will automatically configure to join their corporate ecosystem after booting up for the first time and connecting to Wi-Fi."






(adsbygoogle = window.adsbygoogle || ).push();



And that advantage would make sense for businesses where some of the workforce are in a satellite office or working from their homes.


A Black Hat conference briefing item on the same said, "Our talk walks through the various stages of bootstrapping, showing which binaries are involved, the IPC flows on the device, and evaluates the network (TLS) security of key client/server communications. We will follow with a live demo showing how a nation-state actor could exploit this vulnerability such that a user could unwrap a brand new Mac, and the attacker could root it out of the box the first time it connects to WiFi."


Hein in Cult of Mac went on to explain that "when enterprise Macs use MDM [Mobile Device Management] to see which apps to install off the Mac App Store, there is no certificate pinning to verify the manifest's authenticity. Hackers could use a man-in-the-middle exploit to install malicious apps to access data. Making matters worse, the flaw could be used to hack an entire company's computers."


Campbell also looked at "certificate pinning," which is intended to authenticate web servers through the configuration process. "In particular, the researchers found a bug in Apple's MDM sequence that, when the process hands the machine over to the Mac App Store, fails to complete pinning to confirm the authenticity of an app download manifest, the report said. The hole provides an opportunity for hackers to install malicious code on a target Mac remotely and without alerting the end user."


Lily Hay Newman referred to "certificate pinning" in Wired as "a method of confirming that particular web servers are who they claim."


A problem during one step was spotted by the researchers. "When MDM hands off to the Mac App Store to download enterprise software, the sequence retrieves a manifest for what to download and where to install it without pinning to confirm the manifest's authenticity."


Endahl said in his company 's news release that "under the hood, the DEP and MDM implementations involve many moving parts, and the bootstrapping process exposes vulnerabilities when a device is brought to a fully-provisioned state."


Apple's response? According to reports, Apple addressed the issue when notified by the researchers, in that the vulnerability was patched in macOS High Sierra 10.13.6.





Explore further:
Apple withdraws some China apps after malware found








33 shares











feedback
feedback to editors













add to favoritesemail to friendprintsave as pdf










googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-1'); );






User comments









Please sign in to add a comment.
Registration is free, and takes less than a minute.
Read more
















Click here to reset your password.

Sign in to get notified via email when new comments are made.











Researchers showed remote style hack for new Macs






mac


Credit: CC0 Public Domain

What could be a happier moment? You starting work with the setup process of a brand new Mac.






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-2'); );



What could be an unhappier moment? You starting work with the setup process of a brand new Mac.


Excuse the quiz writers for puzzling over an answer key, as news unfolds that hacking would be possible via Apple's enterprise hardware management setup tools.


The result would be gaining remote access to the Mac.


It appeared that the new Mac could be compromised even before the user were to take it out of the box.


The researchers' findings were discussed at the recent Black Hat USA 2018 in Las Vegas. Jesse Endahl, chief security officer of Apple device management firm Fleetsmith, and Max Bélanger, a staff engineer at Dropbox, were at the show to explain their findings.


"We found a bug that allows us to compromise the device and install malicious software before the user is ever even logged in for the very first time," Endahl said, in Cult of Mac.


What's it all about?


Simply put, the mischief maker can construct, as Mikey Campbell in AppleInsider wrote, " a man-in-the-middle attack that downloads malware or other malicious software before a client logs in to a new Mac for the first time."


The "enterprise tools" involved and being talked about at length are the Device Enrollment Program and Mobile Device Management platform.


"The attack takes advantage of enterprise Macs using Apple's Device Enrollment Program (.pdf) and its Mobile Device Management platform," said Buster Hein at Cult of Mac. "The enterprise tools allow companies to completely customize a Mac shipped to an employee straight from Apple. However, a flaw in the system allows attackers to put malware on the Macs remotely."


These very tools work in tandem so that companies can look forward to easy IT setup regimens in deploying a large number of devices to their workers, said AppleInsider.


As Wired also said, "The idea is that a company can ship Macs to its workers directly from Apple's warehouses, and the devices will automatically configure to join their corporate ecosystem after booting up for the first time and connecting to Wi-Fi."






(adsbygoogle = window.adsbygoogle || ).push();



And that advantage would make sense for businesses where some of the workforce are in a satellite office or working from their homes.


A Black Hat conference briefing item on the same said, "Our talk walks through the various stages of bootstrapping, showing which binaries are involved, the IPC flows on the device, and evaluates the network (TLS) security of key client/server communications. We will follow with a live demo showing how a nation-state actor could exploit this vulnerability such that a user could unwrap a brand new Mac, and the attacker could root it out of the box the first time it connects to WiFi."


Hein in Cult of Mac went on to explain that "when enterprise Macs use MDM [Mobile Device Management] to see which apps to install off the Mac App Store, there is no certificate pinning to verify the manifest's authenticity. Hackers could use a man-in-the-middle exploit to install malicious apps to access data. Making matters worse, the flaw could be used to hack an entire company's computers."


Campbell also looked at "certificate pinning," which is intended to authenticate web servers through the configuration process. "In particular, the researchers found a bug in Apple's MDM sequence that, when the process hands the machine over to the Mac App Store, fails to complete pinning to confirm the authenticity of an app download manifest, the report said. The hole provides an opportunity for hackers to install malicious code on a target Mac remotely and without alerting the end user."


Lily Hay Newman referred to "certificate pinning" in Wired as "a method of confirming that particular web servers are who they claim."


A problem during one step was spotted by the researchers. "When MDM hands off to the Mac App Store to download enterprise software, the sequence retrieves a manifest for what to download and where to install it without pinning to confirm the manifest's authenticity."


Endahl said in his company 's news release that "under the hood, the DEP and MDM implementations involve many moving parts, and the bootstrapping process exposes vulnerabilities when a device is brought to a fully-provisioned state."


Apple's response? According to reports, Apple addressed the issue when notified by the researchers, in that the vulnerability was patched in macOS High Sierra 10.13.6.





Explore further:
Apple withdraws some China apps after malware found








33 shares











feedback
feedback to editors













add to favoritesemail to friendprintsave as pdf









Researchers showed remote style hack for new Macs






mac


Credit: CC0 Public Domain

What could be a happier moment? You starting work with the setup process of a brand new Mac.






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-2'); );



What could be an unhappier moment? You starting work with the setup process of a brand new Mac.


Excuse the quiz writers for puzzling over an answer key, as news unfolds that hacking would be possible via Apple's enterprise hardware management setup tools.


The result would be gaining remote access to the Mac.


It appeared that the new Mac could be compromised even before the user were to take it out of the box.


The researchers' findings were discussed at the recent Black Hat USA 2018 in Las Vegas. Jesse Endahl, chief security officer of Apple device management firm Fleetsmith, and Max Bélanger, a staff engineer at Dropbox, were at the show to explain their findings.


"We found a bug that allows us to compromise the device and install malicious software before the user is ever even logged in for the very first time," Endahl said, in Cult of Mac.


What's it all about?


Simply put, the mischief maker can construct, as Mikey Campbell in AppleInsider wrote, " a man-in-the-middle attack that downloads malware or other malicious software before a client logs in to a new Mac for the first time."


The "enterprise tools" involved and being talked about at length are the Device Enrollment Program and Mobile Device Management platform.


"The attack takes advantage of enterprise Macs using Apple's Device Enrollment Program (.pdf) and its Mobile Device Management platform," said Buster Hein at Cult of Mac. "The enterprise tools allow companies to completely customize a Mac shipped to an employee straight from Apple. However, a flaw in the system allows attackers to put malware on the Macs remotely."


These very tools work in tandem so that companies can look forward to easy IT setup regimens in deploying a large number of devices to their workers, said AppleInsider.


As Wired also said, "The idea is that a company can ship Macs to its workers directly from Apple's warehouses, and the devices will automatically configure to join their corporate ecosystem after booting up for the first time and connecting to Wi-Fi."






(adsbygoogle = window.adsbygoogle || ).push();



And that advantage would make sense for businesses where some of the workforce are in a satellite office or working from their homes.


A Black Hat conference briefing item on the same said, "Our talk walks through the various stages of bootstrapping, showing which binaries are involved, the IPC flows on the device, and evaluates the network (TLS) security of key client/server communications. We will follow with a live demo showing how a nation-state actor could exploit this vulnerability such that a user could unwrap a brand new Mac, and the attacker could root it out of the box the first time it connects to WiFi."


Hein in Cult of Mac went on to explain that "when enterprise Macs use MDM [Mobile Device Management] to see which apps to install off the Mac App Store, there is no certificate pinning to verify the manifest's authenticity. Hackers could use a man-in-the-middle exploit to install malicious apps to access data. Making matters worse, the flaw could be used to hack an entire company's computers."


Campbell also looked at "certificate pinning," which is intended to authenticate web servers through the configuration process. "In particular, the researchers found a bug in Apple's MDM sequence that, when the process hands the machine over to the Mac App Store, fails to complete pinning to confirm the authenticity of an app download manifest, the report said. The hole provides an opportunity for hackers to install malicious code on a target Mac remotely and without alerting the end user."


Lily Hay Newman referred to "certificate pinning" in Wired as "a method of confirming that particular web servers are who they claim."


A problem during one step was spotted by the researchers. "When MDM hands off to the Mac App Store to download enterprise software, the sequence retrieves a manifest for what to download and where to install it without pinning to confirm the manifest's authenticity."


Endahl said in his company 's news release that "under the hood, the DEP and MDM implementations involve many moving parts, and the bootstrapping process exposes vulnerabilities when a device is brought to a fully-provisioned state."


Apple's response? According to reports, Apple addressed the issue when notified by the researchers, in that the vulnerability was patched in macOS High Sierra 10.13.6.





Explore further:
Apple withdraws some China apps after malware found








33 shares











feedback
feedback to editors













add to favoritesemail to friendprintsave as pdf






Researchers showed remote style hack for new Macs






mac


Credit: CC0 Public Domain

What could be a happier moment? You starting work with the setup process of a brand new Mac.






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-2'); );



What could be an unhappier moment? You starting work with the setup process of a brand new Mac.


Excuse the quiz writers for puzzling over an answer key, as news unfolds that hacking would be possible via Apple's enterprise hardware management setup tools.


The result would be gaining remote access to the Mac.


It appeared that the new Mac could be compromised even before the user were to take it out of the box.


The researchers' findings were discussed at the recent Black Hat USA 2018 in Las Vegas. Jesse Endahl, chief security officer of Apple device management firm Fleetsmith, and Max Bélanger, a staff engineer at Dropbox, were at the show to explain their findings.


"We found a bug that allows us to compromise the device and install malicious software before the user is ever even logged in for the very first time," Endahl said, in Cult of Mac.


What's it all about?


Simply put, the mischief maker can construct, as Mikey Campbell in AppleInsider wrote, " a man-in-the-middle attack that downloads malware or other malicious software before a client logs in to a new Mac for the first time."


The "enterprise tools" involved and being talked about at length are the Device Enrollment Program and Mobile Device Management platform.


"The attack takes advantage of enterprise Macs using Apple's Device Enrollment Program (.pdf) and its Mobile Device Management platform," said Buster Hein at Cult of Mac. "The enterprise tools allow companies to completely customize a Mac shipped to an employee straight from Apple. However, a flaw in the system allows attackers to put malware on the Macs remotely."


These very tools work in tandem so that companies can look forward to easy IT setup regimens in deploying a large number of devices to their workers, said AppleInsider.


As Wired also said, "The idea is that a company can ship Macs to its workers directly from Apple's warehouses, and the devices will automatically configure to join their corporate ecosystem after booting up for the first time and connecting to Wi-Fi."






(adsbygoogle = window.adsbygoogle || ).push();



And that advantage would make sense for businesses where some of the workforce are in a satellite office or working from their homes.


A Black Hat conference briefing item on the same said, "Our talk walks through the various stages of bootstrapping, showing which binaries are involved, the IPC flows on the device, and evaluates the network (TLS) security of key client/server communications. We will follow with a live demo showing how a nation-state actor could exploit this vulnerability such that a user could unwrap a brand new Mac, and the attacker could root it out of the box the first time it connects to WiFi."


Hein in Cult of Mac went on to explain that "when enterprise Macs use MDM [Mobile Device Management] to see which apps to install off the Mac App Store, there is no certificate pinning to verify the manifest's authenticity. Hackers could use a man-in-the-middle exploit to install malicious apps to access data. Making matters worse, the flaw could be used to hack an entire company's computers."


Campbell also looked at "certificate pinning," which is intended to authenticate web servers through the configuration process. "In particular, the researchers found a bug in Apple's MDM sequence that, when the process hands the machine over to the Mac App Store, fails to complete pinning to confirm the authenticity of an app download manifest, the report said. The hole provides an opportunity for hackers to install malicious code on a target Mac remotely and without alerting the end user."


Lily Hay Newman referred to "certificate pinning" in Wired as "a method of confirming that particular web servers are who they claim."


A problem during one step was spotted by the researchers. "When MDM hands off to the Mac App Store to download enterprise software, the sequence retrieves a manifest for what to download and where to install it without pinning to confirm the manifest's authenticity."


Endahl said in his company 's news release that "under the hood, the DEP and MDM implementations involve many moving parts, and the bootstrapping process exposes vulnerabilities when a device is brought to a fully-provisioned state."


Apple's response? According to reports, Apple addressed the issue when notified by the researchers, in that the vulnerability was patched in macOS High Sierra 10.13.6.





Explore further:
Apple withdraws some China apps after malware found








33 shares











feedback
feedback to editors













add to favoritesemail to friendprintsave as pdf







mac


Credit: CC0 Public Domain

What could be a happier moment? You starting work with the setup process of a brand new Mac.






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-2'); );



What could be an unhappier moment? You starting work with the setup process of a brand new Mac.


Excuse the quiz writers for puzzling over an answer key, as news unfolds that hacking would be possible via Apple's enterprise hardware management setup tools.


The result would be gaining remote access to the Mac.


It appeared that the new Mac could be compromised even before the user were to take it out of the box.


The researchers' findings were discussed at the recent Black Hat USA 2018 in Las Vegas. Jesse Endahl, chief security officer of Apple device management firm Fleetsmith, and Max Bélanger, a staff engineer at Dropbox, were at the show to explain their findings.


"We found a bug that allows us to compromise the device and install malicious software before the user is ever even logged in for the very first time," Endahl said, in Cult of Mac.


What's it all about?


Simply put, the mischief maker can construct, as Mikey Campbell in AppleInsider wrote, " a man-in-the-middle attack that downloads malware or other malicious software before a client logs in to a new Mac for the first time."


The "enterprise tools" involved and being talked about at length are the Device Enrollment Program and Mobile Device Management platform.


"The attack takes advantage of enterprise Macs using Apple's Device Enrollment Program (.pdf) and its Mobile Device Management platform," said Buster Hein at Cult of Mac. "The enterprise tools allow companies to completely customize a Mac shipped to an employee straight from Apple. However, a flaw in the system allows attackers to put malware on the Macs remotely."


These very tools work in tandem so that companies can look forward to easy IT setup regimens in deploying a large number of devices to their workers, said AppleInsider.


As Wired also said, "The idea is that a company can ship Macs to its workers directly from Apple's warehouses, and the devices will automatically configure to join their corporate ecosystem after booting up for the first time and connecting to Wi-Fi."






(adsbygoogle = window.adsbygoogle || ).push();



And that advantage would make sense for businesses where some of the workforce are in a satellite office or working from their homes.


A Black Hat conference briefing item on the same said, "Our talk walks through the various stages of bootstrapping, showing which binaries are involved, the IPC flows on the device, and evaluates the network (TLS) security of key client/server communications. We will follow with a live demo showing how a nation-state actor could exploit this vulnerability such that a user could unwrap a brand new Mac, and the attacker could root it out of the box the first time it connects to WiFi."


Hein in Cult of Mac went on to explain that "when enterprise Macs use MDM [Mobile Device Management] to see which apps to install off the Mac App Store, there is no certificate pinning to verify the manifest's authenticity. Hackers could use a man-in-the-middle exploit to install malicious apps to access data. Making matters worse, the flaw could be used to hack an entire company's computers."


Campbell also looked at "certificate pinning," which is intended to authenticate web servers through the configuration process. "In particular, the researchers found a bug in Apple's MDM sequence that, when the process hands the machine over to the Mac App Store, fails to complete pinning to confirm the authenticity of an app download manifest, the report said. The hole provides an opportunity for hackers to install malicious code on a target Mac remotely and without alerting the end user."


Lily Hay Newman referred to "certificate pinning" in Wired as "a method of confirming that particular web servers are who they claim."


A problem during one step was spotted by the researchers. "When MDM hands off to the Mac App Store to download enterprise software, the sequence retrieves a manifest for what to download and where to install it without pinning to confirm the manifest's authenticity."


Endahl said in his company 's news release that "under the hood, the DEP and MDM implementations involve many moving parts, and the bootstrapping process exposes vulnerabilities when a device is brought to a fully-provisioned state."


Apple's response? According to reports, Apple addressed the issue when notified by the researchers, in that the vulnerability was patched in macOS High Sierra 10.13.6.






mac






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-2'); );






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-2'); );






(adsbygoogle = window.adsbygoogle || ).push();





Explore further:
Apple withdraws some China apps after malware found








33 shares











feedback
feedback to editors











33 shares











feedback
feedback to editors









33 shares














33 shares












33 shares











feedback
feedback to editors












add to favoritesemail to friendprintsave as pdf




















add to favoritesemail to friendprintsave as pdf






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-3'); );




  • Featured

  • Last comments

  • Popular

  • Most shared



A new artificial neural network framework for gait based biometrics 23 hours ago

DeepMind sees promising AI results for data center cooling system Aug 20, 2018

Patent talk: Siri with personalized responses for nice support chops Aug 19, 2018

A light-weight and accurate deep learning model for audiovisual emotion recognition Aug 17, 2018

When ok is not ok: Security presenter talks about synthetic clicks Aug 17, 2018






A new artificial neural network framework for gait based biometrics 23 hours ago

DeepMind sees promising AI results for data center cooling system Aug 20, 2018

Patent talk: Siri with personalized responses for nice support chops Aug 19, 2018

A light-weight and accurate deep learning model for audiovisual emotion recognition Aug 17, 2018

When ok is not ok: Security presenter talks about synthetic clicks Aug 17, 2018










WPA3 security protocol will keep Wi-Fi connections safer
Jun 27, 2018










Researchers investigate potential threat to speech privacy via smartphone motion sensors
Jun 15, 2018










Cortana vulnerability has been patched
Jun 14, 2018










Firmware, blind spots flagged by Spectre attack research
May 22, 2018










Well, that was easy: Two-factor authentication hack feeds on phony e-mail
May 14, 2018










Amazon has mitigations so that Alexa does not turn into eavesdropper
Apr 27, 2018










F-Secure finds a way to hack older RFID based hotel key locks
Apr 26, 2018










Princeton's tech watchers shine glaring light on web tracking, data slurping
Apr 21, 2018










PowerHammer is wake-up call to data-stealing through power lines
Apr 18, 2018










Internet to TLS 1.3: Where have you been all my life
Mar 28, 2018











WPA3 security protocol will keep Wi-Fi connections safer
Jun 27, 2018









WPA3 security protocol will keep Wi-Fi connections safer
Jun 27, 2018







WPA3 security protocol will keep Wi-Fi connections safer
Jun 27, 2018



Jun 27, 2018







Researchers investigate potential threat to speech privacy via smartphone motion sensors
Jun 15, 2018









Researchers investigate potential threat to speech privacy via smartphone motion sensors
Jun 15, 2018







Researchers investigate potential threat to speech privacy via smartphone motion sensors
Jun 15, 2018



Jun 15, 2018







Cortana vulnerability has been patched
Jun 14, 2018









Cortana vulnerability has been patched
Jun 14, 2018







Cortana vulnerability has been patched
Jun 14, 2018



Jun 14, 2018







Firmware, blind spots flagged by Spectre attack research
May 22, 2018









Firmware, blind spots flagged by Spectre attack research
May 22, 2018







Firmware, blind spots flagged by Spectre attack research
May 22, 2018



May 22, 2018







Well, that was easy: Two-factor authentication hack feeds on phony e-mail
May 14, 2018









Well, that was easy: Two-factor authentication hack feeds on phony e-mail
May 14, 2018







Well, that was easy: Two-factor authentication hack feeds on phony e-mail
May 14, 2018



May 14, 2018







Amazon has mitigations so that Alexa does not turn into eavesdropper
Apr 27, 2018









Amazon has mitigations so that Alexa does not turn into eavesdropper
Apr 27, 2018







Amazon has mitigations so that Alexa does not turn into eavesdropper
Apr 27, 2018



Apr 27, 2018







F-Secure finds a way to hack older RFID based hotel key locks
Apr 26, 2018









F-Secure finds a way to hack older RFID based hotel key locks
Apr 26, 2018







F-Secure finds a way to hack older RFID based hotel key locks
Apr 26, 2018



Apr 26, 2018







Princeton's tech watchers shine glaring light on web tracking, data slurping
Apr 21, 2018









Princeton's tech watchers shine glaring light on web tracking, data slurping
Apr 21, 2018







Princeton's tech watchers shine glaring light on web tracking, data slurping
Apr 21, 2018



Apr 21, 2018







PowerHammer is wake-up call to data-stealing through power lines
Apr 18, 2018









PowerHammer is wake-up call to data-stealing through power lines
Apr 18, 2018







PowerHammer is wake-up call to data-stealing through power lines
Apr 18, 2018



Apr 18, 2018







Internet to TLS 1.3: Where have you been all my life
Mar 28, 2018









Internet to TLS 1.3: Where have you been all my life
Mar 28, 2018







Internet to TLS 1.3: Where have you been all my life
Mar 28, 2018



Mar 28, 2018






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-1'); );






googletag.cmd.push(function() googletag.display('div-gpt-ad-1453799284784-1'); );















More efficient security for cloud-based machine learning


A novel encryption method devised by MIT researchers secures data used in online neural networks, without dramatically slowing their runtimes. This approach holds promise for using cloud-based neural networks for medical-image ...

Aug 17, 2018







A novel encryption method devised by MIT researchers secures data used in online neural networks, without dramatically slowing their runtimes. This approach holds promise for using cloud-based neural networks for medical-image ...


Aug 17, 2018






Google clarifies location-tracking policy


Google has revised a help page that erroneously described how its "Location History" setting works, clarifying for users that it still tracks their location even if they turn the setting off.

Aug 16, 2018







Google has revised a help page that erroneously described how its "Location History" setting works, clarifying for users that it still tracks their location even if they turn the setting off.


Aug 16, 2018






DefCon presenters explore programmer de-anonymization, stylistic fingerprints


One of the nicer things about higher education: Gaining awareness of the signature styles of authors, painters, musicians even before we are told their names. Well, signature styles are not just confined to the arts.

Aug 15, 2018







One of the nicer things about higher education: Gaining awareness of the signature styles of authors, painters, musicians even before we are told their names. Well, signature styles are not just confined to the arts.


Aug 15, 2018






Intel processor vulnerability could put millions of PCs at risk


A newly discovered processor vulnerability could potentially put secure information at risk in any Intel-based PC manufactured since 2008. It could affect users who rely on a digital lockbox feature known as Intel Software ...

Aug 14, 2018







A newly discovered processor vulnerability could potentially put secure information at risk in any Intel-based PC manufactured since 2008. It could affect users who rely on a digital lockbox feature known as Intel Software ...


Aug 14, 2018






Tencent Blade Team pair talk about smart speaker hack


Security researchers turned themselves into hackers this month to demo the way a smart speaker could be turned into a spy. The researchers took their story to DefCon 2018. They said they achieved remote eavesdropping. Both ...

Aug 14, 2018







Security researchers turned themselves into hackers this month to demo the way a smart speaker could be turned into a spy. The researchers took their story to DefCon 2018. They said they achieved remote eavesdropping. Both ...


Aug 14, 2018






Google tracks your movements, like it or not


Google wants to know where you go so badly that it records your movements even when you explicitly tell it not to.

Aug 13, 2018







Google wants to know where you go so badly that it records your movements even when you explicitly tell it not to.


Aug 13, 2018






Researchers showed remote style hack for new Macs


What could be a happier moment? You starting work with the setup process of a brand new Mac.

Aug 13, 2018







What could be a happier moment? You starting work with the setup process of a brand new Mac.


Aug 13, 2018






Researchers help close security hole in popular encryption software


Cybersecurity researchers at the Georgia Institute of Technology have helped close a security vulnerability that could have allowed hackers to steal encryption keys from a popular security package by briefly listening in ...

Aug 09, 2018







Cybersecurity researchers at the Georgia Institute of Technology have helped close a security vulnerability that could have allowed hackers to steal encryption keys from a popular security package by briefly listening in ...


Aug 09, 2018












Holding law enforcement accountable for electronic surveillance


When the FBI filed a court order in 2016 commanding Apple to unlock the San Bernandino shooter's iPhone, the news made headlines across the globe. Yet every day there are tens tens of thousands of of other court orders asking ...

Aug 08, 2018







When the FBI filed a court order in 2016 commanding Apple to unlock the San Bernandino shooter's iPhone, the news made headlines across the globe. Yet every day there are tens tens of thousands of of other court orders asking ...


Aug 08, 2018






Using machine learning to detect software vulnerabilities


A team of researchers from R&D company Draper and Boston University developed a new large-scale vulnerability detection system using machine learning algorithms, which could help to discover software vulnerabilities faster ...

Jul 24, 2018







A team of researchers from R&D company Draper and Boston University developed a new large-scale vulnerability detection system using machine learning algorithms, which could help to discover software vulnerabilities faster ...


Jul 24, 2018






Apps make it easy for domestic abusers to spy


Thousands of apps that allow domestic abusers to secretly spy on their partners are simple to install, difficult to detect, and marketed through a murky web of online advertising, blogs and videos explaining how to use them ...

Jul 24, 2018







Thousands of apps that allow domestic abusers to secretly spy on their partners are simple to install, difficult to detect, and marketed through a murky web of online advertising, blogs and videos explaining how to use them ...


Jul 24, 2018






Team suggests a way to protect autonomous grids from potentially crippling GPS spoofing attacks


Not long ago, getting a virus was about the worst thing computer users could expect in terms of system vulnerability. But in our current age of hyper-connectedness and the emerging Internet of Things, that's no longer the ...

Jul 20, 2018







Not long ago, getting a virus was about the worst thing computer users could expect in terms of system vulnerability. But in our current age of hyper-connectedness and the emerging Internet of Things, that's no longer the ...


Jul 20, 2018






Researcher blogged about workaround for Apple OS update's USB Restricted Mode


The iOS 11.4.1 update carries the USB Restricted Mode. But could law enforcement work around it? That dominated news about the feature on Tuesday. Let's see what the feature is all about and how it has been, of sorts, outsmarted.

Jul 11, 2018







The iOS 11.4.1 update carries the USB Restricted Mode. But could law enforcement work around it? That dominated news about the feature on Tuesday. Let's see what the feature is all about and how it has been, of sorts, outsmarted.


Jul 11, 2018






Privacy conversation turns to enabling smart TV tracking services


Remember when tech topics had such happy focal points as bendable displays and a new stylus for tablets? Unfortunately, the accent in this year's headlines is on how much we might be getting tracked. Facebook, move over. ...

Jul 08, 2018







Remember when tech topics had such happy focal points as bendable displays and a new stylus for tablets? Unfortunately, the accent in this year's headlines is on how much we might be getting tracked. Facebook, move over. ...


Jul 08, 2018






Is your smartphone spying on you?


Some popular apps on your phone may be secretly taking screenshots of your activity and sending them to third parties, according to a new study by a team of Northeastern researchers.

Jul 06, 2018







Some popular apps on your phone may be secretly taking screenshots of your activity and sending them to third parties, according to a new study by a team of Northeastern researchers.


Jul 06, 2018






Calling Android: Researchers see if Rowhammer-based exploits still possible


Android risks fade... and remorph. A variant of Rowhammer has turned up according to a discovery by researchers from institutions including Vrije Universiteit Amsterdam.

Jul 04, 2018







Android risks fade... and remorph. A variant of Rowhammer has turned up according to a discovery by researchers from institutions including Vrije Universiteit Amsterdam.


Jul 04, 2018



User comments









Please sign in to add a comment.
Registration is free, and takes less than a minute.
Read more
















Click here to reset your password.

Sign in to get notified via email when new comments are made.










Please sign in to add a comment.
Registration is free, and takes less than a minute.
Read more
















Click here to reset your password.

Sign in to get notified via email when new comments are made.





Please sign in to add a comment.
Registration is free, and takes less than a minute.
Read more
















Click here to reset your password.

Sign in to get notified via email when new comments are made.






















Science X










Science X









  • Business

  • Computer Sciences

  • Consumer & Gadgets

  • Energy & Green Tech


  • Engineering

  • Hardware

  • Hi Tech & Innovation

  • Internet


  • Other

  • Robotics

  • Security

  • Semiconductors


  • Software

  • Telecom





Science X

















Science X Network












Science X Network










Science X Network








Enter your Science X account credentials






Forget password?







Sign in with your Facebook or Google+ account


fbfb

Not a member? Register







Forget password?











Sign in with your Facebook or Google+ account


fbfb

Not a member? Register




fbfb






















Quantcast

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP

Popular posts from this blog

How to make file upload 'Required' in Contact Form 7?

Rothschild family

amazon EC2 - How to make wp-config.php to writable?