Jump to content

Is Apple's security honeymoon on OS X ending?


RV_

Recommended Posts

Now before the Apple folks start circling the wagons and changing the subject to Windows by comparison, the article does just that already.

 

Excerpt:

 

"The jump in OS X malware also still pales in comparison to Windows.

 

"If you put all of the Mac malware that we've seen, and you combine those numbers for the history of OS X, basically it is less by a significant amount than the amount of Windows malware you will see in an hour," said Rich Mogull, an analyst with Securiosis in Phoenix, Ariz.

 

Apple, which usually does not comment on security issues, declined to comment.

 

Over the last several years, including in the latest version of OS X, El Capitan, Apple has been hardening keys parts of the operating system to make it much harder for attackers to run rogue code.

 

Still, software is fallible, and even well-resourced companies such as Apple make coding mistakes that could provide opportunities.

 

Also, OS X is attracting more attention from highly skilled security experts, who have found ways around some of its recent defenses.

 

Tricking the Gatekeeper

 

Patrick Wardle, director of research with the company Synack, has extensively studied Apple's Gatekeeper, a key defense in preventing certain kinds of applications from installing.

 

Gatekeeper, introduced in 2012, checks if applications have a digital signature and will block those that don't have one approved by Apple.

 

Wardle found a way around Gatekeeper earlier this year, and Apple patched the issue. But after studying it for a few days, he bypassed Gatekeeper again.

 

"Instead of them implementing a more generic patch or generic fix, they kind of did just what was the bare minimum," Wardle said.

"That's a little worrisome."

 

His latest findings were presented two weeks ago at the Virus Bulletin security conference in Prague, and Apple has been notified.

 

Wardle talks to Apple's security team regularly about bugs he finds in OS X. They are "sharp guys," he says, but they may be fighting a company culture where usability in many cases trumps security.

 

Locking down OS X's core

 

Apple introduced a new defense in OS X El Capitan called System Integrity Protection (SIP), which is makes it a lot harder for malware writers to touch critical OS files.

 

SIP blocks the most powerful kind of access to the operating system, known as "root." That access is usually only prevented by a single password set by the Mac's user, who has administrative privileges.

 

If that password is compromised, an attacker with root access can disable other security protections, posing a great risk.

 

SIP greatly reduces the opportunity for malware writers to put something deeply rooted in OS X, said Rich Trouton, a Mac systems administrator in Middletown, Maryland, who writes the Der Flounder blog.

 

"People look at it and go 'Apple's not finding a bunch of malware,'" Trouton said. "And that's true at the moment, but the reason for that is that Apple's put a lot work into making OS X a less appealing target."

 

However, "who knows what the future may bring," he said.

 

More eyes on the code

 

Another interesting fact about OS X this year: about four times more software vulnerabilities have been disclosed than in past years.

A list shows 276 flaws have been found this year, which is about four times higher than the average number found annually over the last 15 years, said Claud Xiao, a security researcher with Palo Alto Networks.

 

"It's a huge increase," Xiao said. "This year, more and more researchers are focused on how to bypass security mechanisms or how to get code to execute remotely."

 

Malware writers also seemed more tuned into using vulnerabilities to infect OS X. Xiao said that in three cases this year, malware or adware used disclosed vulnerabilities to get onto systems.

 

Mac malware and adware programs have typically relied on tricking users into installing them rather than exploiting vulnerabilities.

 

Apple's built-in AV product, called XProtect, is regularly updated to block nuisances like adware.

 

But Wardle said Apple has fixed more than 100 security bugs in El Capitan so far, which means there are likely other opportunities to get malware onto a machine.

 

"I'm sure more advanced adversaries could find remote vulnerabilities if they needed to," he said."

 

The whole article with hot links to the related reports is here: http://www.infoworld.com/article/2993319/security/is-apples-security-honeymoon-on-os-x-ending.html?phint=newt%3Dinfoworld_tech_apple&phint=idg_eid%3D6aa01e18b29f7b6f9149f611f8eac228#tk.IFWNLE_nlt_max_2015-10-21

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

Guest
This topic is now closed to further replies.
×
×
  • Create New...