Special Features

Cybersecurity Month

macOS HM Surf vuln might already be under exploit by major malware family

Like keeping your camera and microphone private? Patch up


In revealing details about a vulnerability that threatens the privacy of Apple fans, Microsoft urges all macOS users to update their systems.

The bug, tracked as CVE-2024-44133 (CVSS 5.5) and patched in September's macOS Sequoia updates, is believed to be potentially exploited by the Adloader macOS malware family, Microsoft's Jonathan Bar Or said.

A successful exploit could potentially allow an attacker to take photos using a device's camera, record audio from its microphone, disclose the user's location, and more.

The vulnerability targets Apple's Transparency, Consent, and Control (TCC) protections, which Microsoft will be acutely aware of given eight of its own macOS apps had TCC-based holes uncovered in August.

Bar Or said the issue is localized to Safari and that no other third-party browsers are vulnerable, although the Windows giant is working with them to secure the core issue at play – local configuration files.

TCC's role in macOS is to ensure users have control over apps' requests for access to various features, displaying prompts and asking whether to approve/deny them.

The feature is driven by what Apple calls "entitlements." Some apps have access to more powerful entitlements than others, Safari being one of them. For example, if an app wants access to a device's microphone, the developers enable the entitlement that prompts a user to accept that access request. Once approved/denied, the setting should remain that way until the user changes it.

Safari has an entitlement that allows it to bypass all TCC protections, and if a user approves it, the app would have free access to all the components that could threaten privacy, as well as things like the device's address book.

Bar Or developed an exploit for the vulnerability that involved modifying the config files in the Safari browser directory, where its TCC-related files are kept.

Using the Directory Service command line utility (dscl), Bar Or was able to change a user's home directory, modify sensitive files in a way that removed TCC protections, change the home directory again so Safari uses those modified files, and then run Safari so they could take snaps, record audio, see download histories, and more.

He also noted that a bad guy could feasibly start Safari in a tiny window so as not to arouse suspicion, all while uploading the data they were after to a server of their choice.

After developing the exploit, which it called "HM Surf," Microsoft worked up and deployed new detection strategies, and the resulting intel from these revealed some suspicious activity that Microsoft claimed bore a hallmark of Adloader.

"Since we weren't able to observe the steps taken leading to the activity, we can't fully determine if the Adload campaign is exploiting the HM Surf vulnerability itself," Bar Or blogged.

"Attackers using a similar method to deploy a prevalent threat raises the importance of having protection against attacks using this technique."

Apple didn't immediately respond to our request for comment. However, if it did, it would probably say – like Bar Or did – that it launched new APIs for App Group Containers so Apple's System Integrity Policy (SIP) can prevent config files from being modified by an attacker, in turn resolving the vulnerability class.

As for how the other browsers are getting on, Firefox has yet to adopt the APIs and the same goes for Chromium, although it's working to adopt os_crypt, which solves the core issue but in a different way. Microsoft's approach was to ensure Defender detects suspicious modifications to Safari's directory. ®

Send us news
16 Comments

Under Trump 2.0, Europe's dependence on US clouds back under the spotlight

Technologist Bert Hubert tells The Reg Microsoft Outlook is a huge source of geopolitical risk

Rather than add a backdoor, Apple decides to kill iCloud encryption for UK peeps

Plus: SEC launches new crypto crime unit; Phishing toolkit upgraded; and more

The software UK techies need to protect themselves now Apple's ADP won’t

No matter how deep you are in Apple's 'ecosystem,’ there are ways to stay encrypted in Blighty

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

XCSSET macOS malware returns with first new version since 2022

Known for popping zero-days of yesteryear, Microsoft puts Apple devs on high alert

Microsoft unveils finalized EU Data Boundary as European doubt over US grows

Some may have second thoughts about going all-in with an American vendor, no matter where their data is stored

Apple promises to spend $500B, hire 20K over 4 years to swerve Trump import tariffs

Sorry, that should read: Boost US manufacturing and R&D, believe in the American people, etc etc

Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time

Boffins poked around inside censorship engines – here's what they found

MITRE Caldera security suite scores perfect 10 for insecurity

Is a trivial remote-code execution hole in every version part of the training, or?

Critical flaws in Mongoose library expose MongoDB to data thieves, code execution

Bugs fixed, updating to the latest version is advisable

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Microsoft shows off novel quantum chip that can scale to 'a million qubits'. So far: Eight

Not just a matter of time but a matter of Majorana fermions, too