Brand new Macs were vulnerable to hacking during their first WiFi log-on, security researchers reveal
- Animator for Netflix’s ‘Carmen Sandiego’ says he was fired after asking for fair pay Sunday 3:17 PM
- YouTube reverses decision to remove creators’ badges Sunday 1:47 PM
- How video game developer Valve got served secret subpoena as part of FBI’s counterterrorism fight Sunday 12:31 PM
- Aron Eisenberg, ‘Star Trek: Deep Space Nine’ actor, dead at 50 Sunday 11:35 AM
- Who needs glass slippers? This Cinderella cosplayer upgraded with a stunning glass arm Sunday 10:19 AM
- How to check if Yahoo owes you $358 Sunday 9:25 AM
- How to stream Bears vs. Redskins on Monday Night Football Sunday 7:00 AM
- What are the best alternatives to the electoral college? Sunday 6:30 AM
- The best PS4 games you can’t play anywhere else Sunday 6:00 AM
- How to watch the 2019 Emmy Awards Sunday 5:00 AM
- How to stream ‘Power’ season 6, episode 5 Sunday 4:00 AM
- Former developer at software company deletes his code to protest its ties to ICE Saturday 4:21 PM
- A mysterious website is doxing Hong Kong protesters and journalists Saturday 1:44 PM
- The best ‘Skyrim’ followers and how to get them Saturday 1:26 PM
- Why Joel Osteen gets cyberbullied every time Houston floods Saturday 12:40 PM
At the Blackhat security conference in Las Vegas this week, security researchers revealed a macOS security bug that affects new devices. When they connect to a WiFi network for the first time, it’s possible—albeit not easy—for a man-in-the-middle to install malware on the system.
Upon its discovery, the researchers, Jesse Endahl, the chief security officer at Mac management firm Fleetsmith, and Max Bélanger, a Dropbox engineer, notified Apple of their findings. They held off disclosing the vulnerability until it had been patched, which Apple did in July with macOS 10.13.6. Machines running older versions of macOS are still vulnerable, but seeing as this bug only affects brand new devices, the chances of this vulnerability being exploited at this point should be quite slim.
According to WIRED, it works like this: “When a Mac turns on and connects to Wi-Fi for the first time, it checks in with Apple’s servers essentially to say, ‘Hey, I’m a MacBook with this serial number. Do I belong to someone? What should I do?'” The system then checks if the serial number is already enrolled in Apple’s enterprise system. The researchers found a problem during one step in this process, when the machine is directed to the Mac App Store to download enterprise software. If a hacker can insert themselves at this point in the setup process, they can re-instruct the machine to download malware, rather than legitimate enterprise software.
The malware could be anything—a key-logger or screen-grabber, or software that infiltrates the rest of the corporate network. The researchers believe this isn’t the sort of thing the average hacker would be interested in undertaking, but something you might see with a state-sponsored attack. (And given the intreating revelations of how far Russia seems to have penetrated American election systems, it seems like a legitimate concern.)
Historically, Windows machines have been more known for malware security issues than Mac devices, but with the growing popularity of Macs, particularly in the workplace, that’s not always the case. Last year, security researches uncovered a serious macOS security bug that allowed hackers potentially steal a user’s passwords stored in their keychain, for example. And the Russian malware that was used to hack the DNC was also found to affect Apple computers.
As always, security vulnerability discoveries like this highlight the importance of keeping machines up to date with system updates.
Christina Bonnington is a tech reporter who specializes in consumer gadgets, apps, and the trends shaping the technology industry. Her work has also appeared in Gizmodo, Wired, Refinery29, Slate, Bicycling, and Outside Magazine. She is based in the San Francisco Bay Area and has a background in electrical engineering.