New macOS vulnerability, “powerdir,” could lead to unauthorized user data access

 Following our discovery of the “Shrootless” vulnerability, Microsoft uncovered a new macOS vulnerability, “powerdir,” that could allow an attacker to bypass the operating system’s Transparency, Consent, and Control (TCC) technology, thereby gaining unauthorized access to a user’s protected data. We shared our findings with Apple through Coordinated Vulnerability Disclosure (CVD) via Microsoft Security Vulnerability Research (MSVR). Apple released a fix for this vulnerability, now identified as CVE-2021-30970, as part of security updates released on December 13, 2021. We encourage macOS users to apply these security updates as soon as possible.

Introduced by Apple in 2012 on macOS Mountain Lion, TCC is essentially designed to help users configure the privacy settings of their apps, such as access to the device’s camera, microphone, or location, as well as access to the user’s calendar or iCloud account, among others. To protect TCC, Apple introduced a feature that prevents unauthorized code execution and enforced a policy that restricts access to TCC to only apps with full disk access. We discovered that it is possible to programmatically change a target user’s home directory and plant a fake TCC database, which stores the consent history of app requests. If exploited on unpatched systems, this vulnerability could allow a malicious actor to potentially orchestrate an attack based on the user’s protected personal data. For example, the attacker could hijack an app installed on the device—or install their own malicious app—and access the microphone to record private conversations or capture screenshots of sensitive information displayed on the user’s screen.

It should be noted that other TCC vulnerabilities were previously reported and subsequently patched before our discovery. It was also through our examination of one of the latest fixes that we came across this bug. In fact, during this research, we had to update our proof-of-concept (POC) exploit because the initial version no longer worked on the latest macOS version, Monterey. This shows that even as macOS or other operating systems and applications become more hardened with each release, software vendors like Apple, security researchers, and the larger security community, need to continuously work together to identify and fix vulnerabilities before attackers can take advantage of them.

Microsoft security researchers continue to monitor the threat landscape to discover new vulnerabilities and attacker techniques that could affect macOS and other non-Windows devices. The discoveries and insights from our research enrich our protection technologies and solutions, such as Microsoft Defender for Endpoint, which allows organizations to gain visibility to their networks that are increasingly becoming heterogeneous. For example, this research informed the generic detection of behavior associated with this vulnerability, enabling Defender for Endpoint to immediately provide visibility and protection against exploits even before the patch is applied. Such visibility also enables organizations to detect, manage, respond to, and remediate vulnerabilities and cross-platform threats faster.

See the rest of this article posted on Microsoft. Here

New macOS vulnerability, “powerdir,” could lead to unauthorized user data access – Microsoft Security Blog

SFile (Escal) ransomware ported for Linux attacks

The operators of the SFile ransomware, also known as Escal, have ported their malware to work and encrypt files on Linux-based operating systems.

Attacks with this new Linux variant were spotted late last year, Chinese security firm Rising said in a report last week, confirmed by The Record with MalwareHunterTeam, one of the people behind the ID-Ransomware project.
The SFile (Escal) ransomware was first seen in attacks in February 2020.
Initial versions were written for encrypting Windows systems only.
Over the past two years, the ransomware has been used as part of targeted attacks against corporate and government networks. During these attacks, SFile is usually deployed to encrypt files, and leave a ransom note for victims telling them to contact the attackers via one of three emails and negotiate a ransom for the decryption key.

Available for Comment: Methodology for Characterizing Network Behavior of IoT Devices

 

NISTIR 8349: Methodology
for Characterizing Network Behavior of Internet of Things Devices

The National Cybersecurity Center of Excellence (NCCoE) has
published for comment a draft NIST Internal Report (NISTIR) 8349: Methodology for Characterizing
Network Behavior of Internet of Things Devices
. The public comment
period is open until February 11, 2022.

Securing a network is a complex task made more challenging when
Internet of Things (IoT) devices are connected to it. NISTIR 8349 demonstrates
how to use device characterization techniques and the MUD-PD open source tool to describe the communication
requirements of IoT devices in support of the manufacturer usage description (MUD) project. Manufacturers
and network administrators can use the techniques and tools described in the
report for capturing network communications from IoT devices, analyzing network
captures, and generating MUD files to help ensure IoT devices perform as
intended.

Your Input Matters      

The NCCoE relies on developers, providers, and users of
cybersecurity technology and information to provide input to our cybersecurity
reports and guidance to produce useful and technically correct resources. We
look forward to receiving your comments on this draft report.

Submit comments via email to iot-ddos-nccoe@nist.gov on or before February
11, 2022. You can also help shape and contribute to this project by joining the
loT Community of Interest by sending an email to iot-ddos-nccoe@nist.gov detailing your
interest.