The end of April is upon us, can you believe it's almost May already? A lot has happened since this time last month, so let's jump right in with April's security news roundup.
Some of the highlights in April include Apple security updates, a phishing scam targeting iPhone users, and an update on the Apple ID extortion attempt, among a slue of other important security news. Read on for the details!
We covered the following updates in this article late last month:
Apple subsequently released the following security updates:
Along with these security updates, however, Apple inadvertently introduced a new insecurity as well.
According to Mac security researcher Patrick Wardle, Apple unintentionally introduced a new zero-day vulnerability in macOS Sierra 10.12.4 in an attempt to fix another security bug that Wardle had reported.
— patrick wardle (@patrickwardle) April 6, 2017
Exploitation of the vulnerability requires network-level auditing to be enabled, which Wardle notes must be turned on with root privileges. For this reason, it's unlikely that many end users will be affected by this vulnerability before Apple releases a fix.
More than two weeks after Wardle published the complete details of his findings, Apple still has not released an update for macOS Sierra to address this vulnerability.
BGR reported that phishing scam text messages targeting iPhone users have been making the rounds this past week.
Some iPhone users have been receiving SMS text messages claiming that their Apple ID will be disabled, unless they confirm their "informations" by tapping on a shortened URL.
Apple will never disable your Apple ID until you tap on a link in a text message.
Anyone who may have fallen victim to this scam should change their password immediately at https://appleid.apple.com. We also advise Apple users to enable two-factor authentication for their Apple ID to help avoid their account becoming compromised by similar scams.
Apple claimed last month that iCloud itself had not been breached, and this claim was corroborated by a report in early April from "Have I Been Pwned?" creator Troy Hunt, who confirmed that the primary source of the Apple e-mail addresses and passwords that Turkish Crime Family had shared with reporters seemed to have been a previous breach of gaming company Evony.
So what happened on April 7? There were no major media reports indicating that a large number of devices had been remotely erased or iCloud accounts reset. As for Turkish Crime Family, a Twitter account apparently belonging to the group claimed that more than $476,000 worth of Bitcoin had been paid to the group on April 7. The implication that the ransom had been paid seems rather suspicious considering that the group had only asked Apple for $75,000.
The crime group's Twitter account has not been updated since April 7.
Thus, if a thief steals your Mac, in theory they could simply reboot your Mac (holding down the Command-Option-P-R keystroke) and prevent you from being able to locate your computer.
To mitigate the weakness, TMO recommended setting a firmware password on your Mac. On a Mac with a firmware password, the NVRAM cannot be reset without first entering the password at boot time.
An unofficial app store was temporarily available within an app in Apple's official App Store, according to a report from iTnews.
According to the report, a Japanese-language app that claimed to have been a household financial helper program was, in fact, a subversive way of getting an unofficial Mandarin Chinese-language app store past Apple's vetting process to get it into the official App Store.
It's unclear what exactly the developer's intention was; perhaps it was intended as a way to install third-party apps, or modified versions of apps, without having to jailbreak a device. However, one app that was available on the unofficial store was a jailbreaking app.
The important take-away for users of iPhone, iPad, and iPod touch devices is that Apple's app vetting process is not perfect, and occasionally some dubious apps make their way into the App Store. Users should exercise caution with any App Store apps that are either new or have very few reviews.
Essentially, an attacker can register a domain with a URL that in Firefox and Opera (and old versions of Chrome) will look identical, or nearly identical, to the address of a legitimate site.
Wordfence used the example of epic.com, a healthcare site, and registered the domain "xn--e1awd7f.com" which uses look-alike, internationalized domain name (IDN) characters that in some browsers appears as "epic.com" in the address bar.
Less than a week after Wordfence published its findings, another researcher registered a look-alike apple.com domain, xn--80ak6aa92e.com, as reported by Ars Technica.
Both example sites have a free TLS ("SSL") certificate from LetsEncrypt, adding legitimacy to the way the sites appear in affected browsers' address bars.
The idea of IDN homograph attacks is not new; there's actually a Wikipedia article for it. However, after the recent media attention, two of the three affected browsers are taking action to address the issue.
Google has already mitigated this issue by releasing Chrome version 58.
Opera users can use the beta version, 45, or the developer version, 46, which mitigate the issue. The current stable release, version 44 (44.0.2510.1218), does not address the issue.
Meanwhile, according to Ars Technica, Mozilla's lead developers have indicated that they do not plan to address the issue by changing Firefox's default behavior. Firefox users who wish to mitigate this issue themselves may do the following:
Apple's Safari browser does not display these sites' addresses in a misleading manner.
The Electronic Frontier Foundation has released a report (summary; full report) detailing privacy concerns with regard to devices issued by schools to students. Those who work in education, or concerned parents, may be interested in reviewing the report, which mentions iPads and some popular edtech apps.
Ed tech apps show troubling trends in data retention and encryption. Read more in our new student privacy report. https://t.co/bxckLiNz4h
— EFF (@EFF) April 15, 2017
Be sure to subscribe to The Mac Security Blog to stay informed about Apple security throughout each month.
If you missed Intego's previous Apple security news roundups for 2017, you can check them out here: