Close ad

In October 2014, a group of six researchers successfully bypassed all of Apple's security mechanisms to place an app on the Mac App Store and the App Store. In practice, they could get malicious applications into Apple devices that would be able to obtain very valuable information. According to an agreement with Apple, this fact was not to be published for about six months, which the researchers complied with.

Every now and then we hear about a security hole, every system has them, but this one is a really big one. It allows an attacker to push an app through both App Stories that can steal the iCloud Keychain password, the Mail app, and all passwords stored in Google Chrome.

[youtube id=”S1tDqSQDngE” width=”620″ height=”350″]

The flaw can allow malware to obtain a password from virtually any app, whether pre-installed or third-party. The group managed to completely overcome sandboxing and thus obtained data from the most used applications such as Everenote or Facebook. The whole matter is described in the document "Unauthorized Cross-App Resource Access on MAC OS X and iOS".

Apple has not commented publicly on the matter and has only requested more detailed information from researchers. Although Google removed the keychain integration, it does not solve the problem as such. The developers of 1Password have confirmed that they cannot 100% guarantee the security of stored data. Once an attacker gets into your device, it's no longer your device. Apple has to come up with a fix at the system level.

Sources: The Register, Agile Bits, Cult of Mac
Topics: ,
.