Saturday, March 1, 2025
HomeAppleNew Unpatched macOS Flaw Allow Hackers to Spy on Safari Browser History

New Unpatched macOS Flaw Allow Hackers to Spy on Safari Browser History

Published on

SIEM as a Service

Follow Us on Google News

Security Researcher discovered a vulnerability in macOS Mojave let malware apps bypass the privacy protection and read the safari browser web history.

macOS Mojave has strictly restrict some of the folder by default and it provide special access for very few apps.

But the newly uncovered flaw bypass the Mojave privacy protection and allow the malicious app to access the folder without any further permission from the users and system.

Jeff Johnson, A researcher who claimed that the flaw exists in every version of Mojave, including macOS Mojave 10.14.3 , a new released version on Feb 7.

In this case, the flow allows attacker to inject the crafted malicious apps to bypass the flaw and read the Safari browsers history.

Jeff said in his report, ” My bypass works with the “hardened runtime” enabled. Thus, an app with the ability to spy on Safari could be “notarized” by Apple (as long as it passed their automated malware checks, which I suspect would be no problem). My bypass does not work with sandboxed apps, as far as I can tell.

Jeff developed the browser extension called StopTheMadness that helps user to provide a smooth browsing experience in Safari, Firefox, and Google Chrome.

He claimed that, “StopTheMadness” extension never spy on you or your browsing history due to this privacy protection flaw and the bypass process uses a completely different method. Moreover, StopTheMadness is sandboxed.

He already reports to Apple regarding this flaw and got the automated acknowledgment but Apple doesn’t provide any bug bounty program for macOS flaws as we have seen earlier Zero-day flaw that was reported by Linus Henze.

There is no technical information available for this unpatched flaw since he reported to Apple in this regarding and waiting for the fixes and the bug to be resolved.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

macOS Zero-day Flaw Allow Hackers to Bypass Kernel Protection by Invisible Mouse Click Attack

Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

LamePyre – macOS Malware That Takes Screenshots Repeatedly and Sends to Attacker

Multiple Malicious Fitness Tracker apps Abusing Apple’s Touch ID Feature To Steal Money From iOS Users

5 Things You Need To Do Before Selling iPhone

New Unpatched macOS Zero-day Flaw Allows Attackers to Read Passwords in Plain Text & System Data


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...