Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Former NSA staffer demonstrates Mac malware that can tap into live webcam and mic feeds
9 to 5 Mac ^ | October 6, 2016 | by Ben Lovejoy

Posted on 10/06/2016 12:26:15 PM PDT by Swordmaker


Security researcher and former NSA staffer Patrick Wardle is this afternoon demonstrating a way for Mac malware to tap into live feeds from the built-in webcam and microphone. His presentation is being delivered at the Virus Bulletin conference in Denver later today.

Although any unauthorized access to the webcam will light the green LED – a firmware-level protection that is exceedingly difficult to bypass – Wardle’s presentation shows how a malicious app can tap into the outgoing feed of an existing webcam session, like a FaceTime or Skype call, where the light would already be on …

Wardle was the researcher who previously uncovered a way for malware to bypass Gatekeeper protection to run unsigned apps, as well as pointing out a flaw in Apple’s fix for the Rootpipe vulnerability that allowed an attacker with local access to a Mac to escalate their privileges to root.

The paper is entitled Getting Duped: Piggybacking on Webcam Streams for Surreptitious Recordings.

After examining various ‘webcam-aware’ OS X malware samples, the research will show a new ‘attack’ that would allow such malware to stealthily monitor the system for legitimate user-initiated video sessions, then surreptitious piggyback into this in order to covertly record the session. As there are no visible indications of this malicious activity (as the LED light is already on), the malware can record both audio and video without fear of detection. 

Wardle has created an app that monitors webcam and microphone activity, and will alert you when a new process accesses either. A pop-up will alert you, advise the name of the process and ask whether you want to allow or block access.

webcam-oversight

The app, called Oversight, is a free download from Wardle’s website, objective-see.com.


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applepinglist; cameramic; malware; security
Navigation: use the links below to view more comments.
first 1-2021-25 next last
Wardle's site is an Apple Certified Developer and the download is also certified. You won't have to turn off any protections to download it. On the other hand, as the article states, turning on the camera surreptitiously is extremely difficult for a hacker to accomplish on a Mac.

This exploit works by getting a malicious app onto the Mac . . . a Trojan. . . but MacOS and OS X recognizes all known Trojans and their variations and families and will warn users when it encounters them to prevent them being downloaded, installed, or run for the first time. It takes industrial strength stupidity for any Mac user to get infected with a malicious app.

The only other way for a malicious app to get onto a Mac is for someone to have physical access to the Mac and an administrator's name and password, again, a very difficult thing to accomplish. If someone has physical access, then they can do anything, and if it's in your home or place of business, they can install cameras and microphones anywhere they want!

1 posted on 10/06/2016 12:26:15 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; 5thGenTexan; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; ...
Demonstration of proof of concept malware for Mac malicious app that can piggy back on any webcam use to spy on users, seeing them and listening through the mic. This DOES require your Mac be infected with a malicious app, a Trojan, a very difficult thing to accomplish on a modern up-to-date Mac. Apple's firmware does not allow the camera to turn on without the light to also illuminate, an extremely hard thing to bypass. — PING!


Apple
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

2 posted on 10/06/2016 12:46:29 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

That’s what black electric tape is for.


3 posted on 10/06/2016 12:47:42 PM PDT by ImJustAnotherOkie
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
The only other way for a malicious app to get onto a Mac is for someone to have physical access to the Mac and an administrator's name and password, again, a very difficult thing to accomplish.

Something here to learn, for the uneducated masses regarding computer use. Whether it be Windows, OSX, UNIX or other operating systems. A lot of people use personal computers with an admin user account. Not wise to do so for mundane activities. Create regular non-admin user accounts, and log onto those non-admin user accounts for browsing the web, for email, etc. If you need admin access, logon and use it as needed, then switch back to the user account.

If the system requires admin access, it will prompt you to enter an admin account and password. If the only account you use is an admin account, then outside bad things have an easier path to your system to wreak havoc.

Again, I'm not speaking of Macs (because they're better protected), but all operating system platforms in general. I've often helped young friends and relatives, and I'm astonished as to how many of them logon to default admin accounts with simple passwords. They haven't been shown safe computing habits. Spread the word to young newbies on computers.

4 posted on 10/06/2016 1:15:23 PM PDT by roadcat
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

James Comey and Mark Zuckerberg both put tape over their microphone and camera slot.

don’t you think you should be doing this also..?


5 posted on 10/06/2016 1:48:25 PM PDT by gaijin
[ Post Reply | Private Reply | To 1 | View Replies]

To: roadcat

Many of the newer Unix and Linux systems don’t even have a root account. If you are in an administrative group, you have to sudo to execute privileged operations. And on the Mac OS, there are things that even root can’t do any more.


6 posted on 10/06/2016 2:08:46 PM PDT by proxy_user
[ Post Reply | Private Reply | To 4 | View Replies]

To: proxy_user

Despite having worked decades on computer systems, I’m still nervous using root access. Too many things can go wrong. And do. We’re all human and mistakes happen. That having been said, I haven’t administered a Unix or Linux server for over 12 years (not speaking of Macs, but servers in a corporate setting). Forgot more than I learned.


7 posted on 10/06/2016 2:17:55 PM PDT by roadcat
[ Post Reply | Private Reply | To 6 | View Replies]

To: proxy_user

“...you have to sudo to execute privileged operations.”

. . . . . . . . . .

What does this mean?


8 posted on 10/06/2016 3:51:54 PM PDT by deks
[ Post Reply | Private Reply | To 6 | View Replies]

To: All

MARK 1 MOD 0 piece of tape fixes that camera crap. Actually office max or depot carries small peel and stick “dots” that do just fine if yer worried about such...


9 posted on 10/06/2016 4:56:57 PM PDT by Squantos ( Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 2 | View Replies]

To: gaijin
James Comey and Mark Zuckerberg both put tape over their microphone and camera slot.

don’t you think you should be doing this also..?

It's not a bad idea. . . but if you've never allowed your computer out of your hands, it's entirely unnecessary. BUT, if you've ever allowed your computer to be worked on by some repair shop such as the BestBuy Geek Squad, then by all means use the tape because someone other than you has had physical possession of your computer.

I don't bother with such kludges on my Macs because they have not been out of my control. . . and my office Macs that have been out for service are gone over with a fine tooth comb by me when they come back.

This actually happened to a good looking girl a few years ago. She had her Mac Laptop she bought at BestBuy in for warranty repair at the Geek Squad. The Geek who repaired it told her that it would be needing to be in a "humid environment at least once daily for best operation." He then suggested she could accomplish this by taking it into the bathroom with her when she took her daily shower. "Oh, and be sure it's on and running!"

Unknown to her, the Geek had hidden software on her Mac that allowed his computer connect to hers when ever it was on, recording what was visible, and then let him watch her through her webcam. . . and of course, what better time to watch than when she was taking a shower! She got suspicious when she noticed the light on the camera was on when she got out of the shower. Oops!

She asked a friend who was an expert Mac user about why a Mac would need to be operated daily in a humid environment. . . and then they called the police who found the tracks of the Geek on her hard drive.

10 posted on 10/06/2016 5:07:20 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 5 | View Replies]

To: proxy_user
Many of the newer Unix and Linux systems don’t even have a root account. If you are in an administrative group, you have to sudo to execute privileged operations. And on the Mac OS, there are things that even root can’t do any more.

Not that I am aware of. Root gets you full access to the underlying UNIX operating system. Are you perhaps thinking about Administrator level access on a mac? That's different more limited level of access than Root.

11 posted on 10/06/2016 5:12:51 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker
James Comey and Mark Zuckerberg both put tape over their microphone and camera slot.

I had a friend who was a large network administrator doing a job similar to mine. Once while showing me his computer facilities, he admitted to hacking worker's PCs with a software package that allowed him to spy on workers through their cameras on their PCs. He had done it at the request of his boss to spy on staff. I raised my eyebrow and said I would never do anything like that. He became very nervous and sweated in my presence after that. That's when I started covering camera lenses with post-it notes when using PCs. The software included seeing the worker's screen, as well as viewing the worker. Was back in the 1990s, most people wouldn't suspect that back then.

12 posted on 10/06/2016 5:20:26 PM PDT by roadcat
[ Post Reply | Private Reply | To 10 | View Replies]

To: deks

The ‘sudo’ command executes the following instruction as root, it you are a member of an admin group.

For example, if you wanted to mount an NFS filesystem, you’d have to use the ‘mount’ command, which can only be executed by root. You’d be logged in with your administrative but non-root account, and type something like:

sudo mount -F nfs someserver:/export/somedirectory /mnt

...and the mount command will execute as root without you being logged in as root. It might prompt you for your regular password if you logged in more than a few minutes ago, just to make sure that some passing stranger hasn’t sat down at your terminal.


13 posted on 10/06/2016 6:04:14 PM PDT by proxy_user
[ Post Reply | Private Reply | To 8 | View Replies]

To: Swordmaker

No, Apple’s direction is to get rid of certain root privileges completely. They don’t want anyone to be able to touch the core operating system, or remove crucial system files. This is not traditional Unix, but do you really want to be able to su to root, cd to /, and rm -rf *?


14 posted on 10/06/2016 6:07:30 PM PDT by proxy_user
[ Post Reply | Private Reply | To 11 | View Replies]

To: proxy_user

thank you


15 posted on 10/06/2016 6:09:00 PM PDT by deks
[ Post Reply | Private Reply | To 13 | View Replies]

To: proxy_user
Many of the newer Unix and Linux systems don’t even have a root account.

Yes they do. It's user 0, and the account always exists.

However, by default, the root account lacks a password. Therefore, no one can log in as root.

Of course, it's perfectly possible to assign root a password, in which case you can then login as root.

However, the recommended practice is for the machine's owner to be a member of the s

16 posted on 10/06/2016 6:19:06 PM PDT by cynwoody
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker
Unknown to her, the Geek had hidden software on her Mac that allowed his computer connect to hers when ever it was on, recording what was visible, and then let him watch her through her webcam. . . and of course, what better time to watch than when she was taking a shower! She got suspicious when she noticed the light on the camera was on when she got out of the shower. Oops!

Glad to hear it was a Geek and not a Genius.

17 posted on 10/06/2016 6:24:24 PM PDT by cynwoody
[ Post Reply | Private Reply | To 10 | View Replies]

To: proxy_user
No, Apple’s direction is to get rid of certain root privileges completely. They don’t want anyone to be able to touch the core operating system, or remove crucial system files.

It's called System Integrity Protection. It disallows changes to /System, /sbin, and /usr (except for /usr/local), even via sudo.

To bypass it, you have to boot into Recovery Mode, enter a command to disable SIP, and reboot into Mac OS. Then you can make your changes as root. When you're done, it is recommended to repeat the above steps, this time re-enabling SIP.

18 posted on 10/06/2016 6:33:31 PM PDT by cynwoody
[ Post Reply | Private Reply | To 14 | View Replies]

To: proxy_user
No, Apple’s direction is to get rid of certain root privileges completely. They don’t want anyone to be able to touch the core operating system, or remove crucial system files. This is not traditional Unix, but do you really want to be able to su to root, cd to /, and rm -rf *?

Apple OS X and MacOS are not only "traditional Unix", but they are both fully functional certified POSIX® Compliant and Trademarked UNIX™!

Where did you get the idea that Apple is trying to block such access? I am running MacOS Sierra Version 10.12 and I can access ROOT right now. When I need to access ROOT, I can, if I want to create a ROOT user. . . and I can SUDO from a Terminal. I just ran a Terminal and did everything you seem to think I can't do. . . except remove things, which I did not need to test. The ROOT user is deactivated by default on Macs, but an Administrator can activate it if he or she wants to; there is nothing preventing it. I have done so, occasionally on one or two computers I own. Not on the one I am currently using to reply right now, but I can still access ROOT if need arises, and activating a ROOT user takes about two minutes effort, most of it booting into an administrator user and then into the new ROOT user.

Quit posting ignorant twaddle seemingly based on something you heard from someone equally or more ignorant.

19 posted on 10/06/2016 6:43:37 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Swordmaker

https://en.wikipedia.org/wiki/System_Integrity_Protection


20 posted on 10/06/2016 6:47:35 PM PDT by proxy_user
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-25 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson