Security & Privacy

Your Mac’s Camera Can Be Hacked

Posted on by

mac-webcam-spyware-article

Related: Porn Blackmail Scam Rattles Mac Users: What You Need to Know

You might be asking, “Is my Mac’s camera hacked?” The truth is your webcam can be accessed without your consent, and therefore covering your Mac’s built-in camera is a good idea. Don’t take my word for it, just see what FBI Director James Comey has to say about it:

There’s some sensible things you should be doing, and that’s one of them,” Comey said regarding webcam covers. “You go into any government office and we all have the little camera things that sit on top of the screen. They all have a little lid that closes down on them. You do that so that people who don’t have authority don’t look at you. I think that’s a good thing.”

He said this while speaking at a conference. Looks like Mark Zuckerberg had the right idea.

But come on, no-one is spying on little old me, right? Are you confident you’d be able to tell if your Mac’s camera was hacked?

Anyone who uses the built-in iSight camera in their iMac or a MacBook knows the little green light will turn on when the camera is in use. However, not only has this indicator light been disabled successfully in the past, you really won’t notice the light turning on for a fraction of a second while a picture is being taken. Hardware is now fast enough to activate the camera, take a picture, and then turn off the camera again in the time it takes you to blink. Even if current spyware is unable to disable the light, chances are you won’t see it when it does come on.

Covering the webcam on your computer is a good idea

We don’t even need to go that far back in time to see an example of malware that has the ability to use your webcam against you, amongst other things. Then there was the Eleanor malware shortly before that, and just to demonstrate this is not a new idea, here’s another one, called BlackHole RAT, from a while back. Let’s not forget well-funded nation states that use some pretty darn sophisticated tricks to get what they want as well. One example is the Trident exploit that was discovered on iOS, which could have just as well been unleashed on OS X before Apple patched the exact same vulnerabilities there about a week later.

Your webcam can be accessed without your consent, and there is malware out there that makes it happen on a somewhat regular basis. Some we know of, most we probably don’t know of. So what can you do? Cover your webcam, silly!

This can be as simple as a sticky note on the camera or, if you want it to match the color of your bezel, some electrical tape. The solution depends on how often you use your camera.

Personally, I never use the camera on my MacBook Pro, so for me some electrical tape does the job. It sits flush, matches the color of my display bezel and I hardly even notice it’s there. My wife, who uses FaceTime often on her iMac, found a sliding webcam cover that gets the job done and doesn’t look half bad. For laptops, just make sure the solution is thin enough to allow the lid close properly and not scratch the aluminum. Closing the lid on your laptop is another solid way to make sure nothing can be seen through your webcam. 😉

There is no right or wrong way, just the way that works for you.

How about the microphone? Malware that accesses your webcam also uses the microphone to capture sound. A quick test showed that a piece of electrical tape over the microphone muffles or blocks sounds just enough so that normal conversation cannot be picked up. It is not possible to completely mute the microphone, unfortunately, as it will always pick up some sounds.

On older laptops, the microphone can be found on the side of the body and on iMacs the microphone sits on the top of the bezel right above the camera. The Mac Pro and Mac mini don’t have built-in microphones. Covering the microphones in newer MacBook Pro’s can become tricky as they are inside the speaker grill. Covering the microphones would mean losing a speaker, which is a sacrifice I doubt anyone would make.

If defacing your Mac is simply not an option, exercise common sense when browsing the web or downloading files, and use a good antivirus and firewall. Keeping malware from even being installed on your Mac is, of course, the best remedy — but this is not always possible. This is where an antivirus will hopefully detect any malware that does make it on to your Mac. For good measure, a two-way firewall with outbound data protection will alert you if anything attempts to make an outgoing connection (upload a webcam snapshot to an off-site server, for example). A good combo-package that includes an award-winning antivirus and firewall is Intego’s Mac Internet Security X9 bundle.

Related stories

But perhaps you came here because you got an e-mail claiming that you were caught viewing pornography—maybe even pedophilia—and perhaps the sender claims to have a video of you in the act. Could this really be true?

Chances are, the claims are false; this is a very common scam because it preys on victims’ fears. Be sure to check out these related articles and video for more details:

Porn Blackmail Scam Rattles Mac Users: What You Need to Know

CIA porn accusation emails: Here’s what Mac users need to know

 

How can I learn more?

Each week on the Intego Mac Podcast, Intego’s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to follow the podcast to make sure you don’t miss any episodes.

You can also subscribe to our e-mail newsletter and keep an eye here on The Mac Security Blog for the latest Apple security and privacy news. And don’t forget to follow Intego on your favorite social media channels: Follow Intego on X/Twitter Follow Intego on Facebook Follow Intego on YouTube Follow Intego on Pinterest Follow Intego on LinkedIn Follow Intego on Instagram Follow the Intego Mac Podcast on Apple Podcasts

 

About Jay Vrijenhoek

Jay Vrijenhoek is an IT consultant with a passion for Mac security research. View all posts by Jay Vrijenhoek →