UPDATED with response from Apple, and with news that patch is available.
Apple's new macOS 10.13 High Sierra is only a day old, and it's already been hacked.
We went with an Amazon WorkSpace solution, they have clients for a wide range of devices (chromebook, linux, mac, windows, fire) and you get like 40 hours for free. (Not nearly enough for full-time use of course, but to run certain pieces of software it works).
A rogue application or other service running on a Mac can easily break into Apple's Keychain password vault and steal all user credentials stored therein, said security researcher Patrick Wardle.
'I'm continually disappointed in the security of macOS,' Wardle told both Ars Technica and ZDNet. 'Every time I look at macOS the wrong way, something falls over.'
To prevent such attacks, users will have to disable Keychain from automatically unlocking whenever they log into their Macs. On the bright side, Wardle has not disclosed exactly how his attack works, and there's no malware in the wild that's known to use this technique.
MORE: Best Mac Antivirus Software
Not upgrading to macOS 10.13 High Sierra won't keep you safe from this sort of attack. Wardle said on his blog that the flaw also exists in macOS 10.12 Sierra, and probably on OS X 10.11 El Capitan as well.
What you can do instead is to change the Keychain settings so that Keychain is not automatically unlocked when you log into your Mac. You'll have to log in every time Keychain needs to be accessed, which will be inconvenient, until Apple patches this flaw.
A video Wardle posted yesterday (Sept. 25) shows his proof-of-concept malware, called 'KeychainStealer,' installing on a Mac running High Sierra.
Wardle then scans the machine using the open-source networking utility Netcat, entering a command, and grabbing his own (presumably temporary) passwords for Facebook ('hunter2'), Twitter ('I_do_this_for_followers') and Bank of America ('ShowMeTheMoney$$$').
'As my discovery of this bug and report (in early September) was 'shortly' before High Sierra's release, this did not give Apple enough time to release a patch on time,' Wardle explained in a blog posting this morning (Sept. 26) 'However, my understanding is a patch will be forthcoming!'
Mac applications normally can access only their own information in the Keychain, which besides passwords can hold any kind of sensitive information, such as credit-card numbers. Wardle's malware completely bypasses that process.
'Random apps should not be able to access the entire keychain and dump things like plaintext passwords,' Wardle wrote on his blog.
Wardle, whose day job is as director of research at Redwood City, California, security firm Synack, didn't get into technical details about how he pulled off the attack. But this isn't the first time he's shown Mac security to be lacking.
'Apple marketing has done a great job convincing people that macOS is secure,' Wardle told ZDNet. 'I think that this is rather irresponsible and leads to issues where Mac users are overconfident and thus more vulnerable.'
The silver lining here is that a random hacker cannot simply log into your Mac from afar and steal your passwords. Rather, the hacker must get you to agree to install the malware, which would probably be masquerading as something else.
You may think 'I'm too smart to fall for that.' But online criminals know how to fool people by using fake software updates, or, as evidenced by the CCleaner hack just last week, by sneaking malware into legitimate software updates at the source.
Airmail – Airmail has been around for many years, and it’s one of the most common third-party mail apps that people mention. It’s free, works with all the major accounts you’ll have, and provides a lot of great features. I originally tried Airmail when it was first released, and it has seen a constant stream of updates since then. Overall, Outlook is awesome. Airmail supports all the major email accounts like iCloud, Exchange, Outlook, Google, Yahoo, IMAP, etc. Best email client for mac ios.
Last year, Wardle himself showed how a well-known antivirus product could be exploited to distribute Mac malware.
Apple has not responded to an email sent by Tom's Guide requesting comment. Watchguard vpn client for mac os x.
However, Apple provided this statement to Ars Technica and to CNET: 'MacOS is designed to be secure by default, and Gatekeeper warns users against installing unsigned apps, like the one shown in this proof of concept, and prevents them from launching the app without explicit approval. We encourage users to download software only from trusted sources like the Mac App Store and to pay careful attention to security dialogs that macOS presents.'
The problem is that Gatekeeper doesn't work very well at keeping out malware, as Wardle and other Mac security researchers have shown time and time again. All Gatekeeper does is check to see whether a new piece of software has been 'signed' with a valid Apple developer ID — and anyone can get an Apple developer ID with an email address and $99.
Wardle deliberately didn't sign KeychainStealer with an Apple developer ID because he 'merely wanted to show how low the bar was/is set,' he explained on his blog.
'Essentially any malicious code can perform this attack,' Wardle added. 'Yes, this includes signed apps as well!'
UPDATE: Apple responded to our query with the same statement it provided to Ars Technica and CNET, reproduced in full above.
UPDATE Oct. 6: Apple has patched this flaw with the macOS 10.13 Supplemental Update, which also fixes a different password-revealing bug.
Kaspersky Internet Security for Mac's top-shelf malware detection and barely there system impact make it the best antivirus solution.
Best Free Mac AntivirusAvast Free Mac Security's malware-squashing proficiency, negligible performance impact and included password manager make it the best free option.
Bitdefender Antivirus for Mac offers top-shelf malware detection and protects files from ransomware.
So I need a little help remote hacking a computer. If you want to know the story of why, here it is:
I came home to not being able to connect to my WiFi, so I connected to it via ethernet cable and see what's up qith the router. Everything seemed to be fine, except one thing, there was me and another guy in the network. I first thought of simply blocking the MAC address but I couldn't hence I could only input 16 characters, which left me with a character left unput (MAC address should be: '00-00-00-00-00-00'). Then all I thought of for an answer was factory default-ing the router. So I did. Then change the name of the network, put on a password and change the router's username and password. Connected then my Laptop and Phone to it and it all seemed to point that it was only me connected. But after 5 minutes, I saw that guy again. The system logs gave no info of this guy doing anything. So I'm kinda fed up since rhis hasn't been the first time said guy has given me trouble, and I think it's about time I put an end to this. (Whitelisting my devices wouldn't work because of the same problem as blacklisting.)
So I know the guy's MAC address and IP address given by the router. What I've done that might slow down the progress is only letting my PC connected via cable manage admin stuff on the router. I'm not looking to mess up this guy, but rather give him a warning.
So, can I have your help? Someone to point me into the right direction?
Thanks in advance! :D EDIT: Ok, so system logs are now showing something from that guy's mac and router IP address, although I don't even know what do they mean, thay go like this: DHCPS:Recv RELEASE from (that guy's MAC address) DHCPS:Recv DISCOVER from (that guy's MAC address) DHCPS:lease host name not found DHCPS:Send OFFER with ip (that guy's router IP address) DHCPS:Recv REQUEST from (that guy's MAC address) DHCPS:Send ACK to (that guy's router IP address) DHCPS:Recv REQUEST from (that guy's MAC address)