Sunday, February 9, 2025
HomeAppleNew Unpatched macOS Flaw Allow Hackers to Spy on Safari Browser History

New Unpatched macOS Flaw Allow Hackers to Spy on Safari Browser History

Published on

SIEM as a Service

Follow Us on Google News

Security Researcher discovered a vulnerability in macOS Mojave let malware apps bypass the privacy protection and read the safari browser web history.

macOS Mojave has strictly restrict some of the folder by default and it provide special access for very few apps.

But the newly uncovered flaw bypass the Mojave privacy protection and allow the malicious app to access the folder without any further permission from the users and system.

Jeff Johnson, A researcher who claimed that the flaw exists in every version of Mojave, including macOS Mojave 10.14.3 , a new released version on Feb 7.

In this case, the flow allows attacker to inject the crafted malicious apps to bypass the flaw and read the Safari browsers history.

Jeff said in his report, ” My bypass works with the “hardened runtime” enabled. Thus, an app with the ability to spy on Safari could be “notarized” by Apple (as long as it passed their automated malware checks, which I suspect would be no problem). My bypass does not work with sandboxed apps, as far as I can tell.

Jeff developed the browser extension called StopTheMadness that helps user to provide a smooth browsing experience in Safari, Firefox, and Google Chrome.

He claimed that, “StopTheMadness” extension never spy on you or your browsing history due to this privacy protection flaw and the bypass process uses a completely different method. Moreover, StopTheMadness is sandboxed.

He already reports to Apple regarding this flaw and got the automated acknowledgment but Apple doesn’t provide any bug bounty program for macOS flaws as we have seen earlier Zero-day flaw that was reported by Linus Henze.

There is no technical information available for this unpatched flaw since he reported to Apple in this regarding and waiting for the fixes and the bug to be resolved.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

macOS Zero-day Flaw Allow Hackers to Bypass Kernel Protection by Invisible Mouse Click Attack

Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

LamePyre – macOS Malware That Takes Screenshots Repeatedly and Sends to Attacker

Multiple Malicious Fitness Tracker apps Abusing Apple’s Touch ID Feature To Steal Money From iOS Users

5 Things You Need To Do Before Selling iPhone

New Unpatched macOS Zero-day Flaw Allows Attackers to Read Passwords in Plain Text & System Data


Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...