This creepy macOS malware secretly takes screenshots of your device

Privacy
(Image credit: Shutterstock / Valery Brozhinsky)

Cybersecurity (opens in new tab) researchers have shared details about a macOS malware (opens in new tab) strain that found a novel way to bypass privacy protections in order to take screenshots of a victim’s desktop.

Apple's macOS (opens in new tab) relies on the Transparency Consent and Control (TCC) framework, to regulate the use of the computer’s resources, such as the webcam (opens in new tab) and the microphone (opens in new tab), by the installed apps. 

Security researchers from mobile device management (MDM (opens in new tab)) firm Jamf discovered the XCSSET malware was exploiting a now-patched zero-day vulnerability in macOS to bypass Apple’s TCC framework.

TechRadar needs yo...

We're looking at how our readers use VPN for a forthcoming in-depth report. We'd love to hear your thoughts in the survey below. It won't take more than 60 seconds of your time.

>> Click here to start the survey in a new window (opens in new tab)<<

The XCSSET malware was first discovered in August 2020 (opens in new tab) inside the Xcode integrated development environment (IDE (opens in new tab)) that’s used by developers on macOS to create applications for iPhone (opens in new tab), iPad (opens in new tab), Mac (opens in new tab), Apple Watch (opens in new tab), and Apple TV (opens in new tab)

Piggyback permissions

Thanks to this unique attack vector, legitimate Apple developers unwittingly distributed the malware to their users, in what security researchers opine can be referred to as a supply-chain-like attack. 

Crucially, despite being outed, the authors behind the malware have been constantly updating it and more recent variants are designed to target the M1 Macs (opens in new tab).

“When it was initially discovered XCSSET was thought to utilize two zero-day exploits...Diving further still into the malware, Jamf discovered that it has also been exploiting a third zero-day to bypass Apple’s TCC framework,” the Jamf security researchers explained in their analysis.

While dissecting the malware, Jamf researchers found that it searches for other apps on the victim’s computer that are frequently granted screen-sharing permissions. 

Once found, it then places a file with malicious screen recording code in the same directory as the legitimate app, in order to inherit the permissions of the legitimate screen-sharing app.

Importantly however, Apple has already patched the vulnerability that made this exploit possible, and urges all macOS 11.4 users to install the fix without delay.

Via TechCrunch (opens in new tab)

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.