Apple Mac PC owners must rush to install the macOS 11.4 update. A malware, known as XCSSET, and prevalent since last year, is able to take screenshots without user consent. Moreover, it can potentially access the victim’s microphone, webcam or capture their keystrokes, such as passwords or credit card numbers.
Security researchers have indicated the XCSSET malware can exploit a serious weakness in macOS security. Malicious code writers can abuse the flaw to record video, access files, and perform other tasks which would otherwise need user permission.
macOS suffering spyware that can get around Transparency Consent and Control:
Cybersecurity company Jamf has reported on XCSSET, but Trend Micro first discovered the security flaw last year. Hackers have now created sleek spyware that can get around a macOS privacy feature known as Transparency Consent and Control (TCC).
.@Apple "fixes" macOS zero-day abused by XCSSET malware
-CVE-2021-30713 is a bypass of TCC, the macOS permission request manager
-XCSSET was abusing it to plant applets inside legitimate apps and run malicious code with their privileges pic.twitter.com/BVL4opi1it
— MALWARE HOMIE 🇨🇴🇮🇷🇵🇸🇺🇲 (@MalwareHomie) May 24, 2021
TCC raises a warning flag when an app is doing something that might affect users’ privacy, such as taking photos or recording keystrokes. The feature forces the application to seek user permission before gaining access to the hardware.
Using the XCSSET, malware coders managed to bypass the critical step. The hackers worked around the security feature by hijacking other apps’ permissions. In other words, the spyware piggybacked on permissions of other apps, which an unsuspecting macOS user had previously granted.
How did XCSSET malware manage to hijack security permissions that macOS users granted for other applications?
Back when Trend Micro first discovered XCSSET, the cybersecurity company realized the malware creators were targeting Apple developers. Hackers were going after Xcode projects that developers use to code and build apps.
Simply put, developers were unwittingly distributing the malware to their users by using infected app development projects. Trend Micro describes these sophisticated and forward-thinking attacks as “supply-chain-like attacks”.
— Gulity Phoenx (@GulityPhoenx) May 24, 2021
Malicious code writers merely needed to install the first phase on a victim running macOS. In its latest iteration, the XCSSET malware reportedly uses two zero-days — one to steal cookies from the Safari browser to get access to a victim’s online accounts, and another to quietly install a development version of Safari, allowing the attackers to modify and snoop on virtually any website.
#Apple's #macOS #BigSur 11.4 patches a zero-day vulnerability that allowed attackers to secretly take screenshots or record video of a user's screen. https://t.co/skzP1rgZVE pic.twitter.com/agn9aG6HO5
— AppleInsider (@appleinsider) May 24, 2021
Jamf, however, claims the malware is exploiting a previously undiscovered third zero-day in order to secretly take screenshots of the victim’s screen. While taking screenshots is one of the purposes, security researchers are warning the bug could allow hackers to access the victim’s microphone, webcam or capture their keystrokes, such as passwords or credit card numbers.
Apple Inc. has confirmed that it has fixed the bug that the XCSSET malware can exploit, in macOS 11.4. The iPhone maker has released the update this week. Needless to mention, it is important Mac PC owners update their systems at the earliest.