Experts told about a new way of hacking MacBook

The new MacBook, you can remotely hack at first boot.

Notebooks based on the macOS in enterprise networks can be hacked through the system’s mobile device management (MDM). Problem not the most simple to implement, however, according to the experts, who discovered the vulnerability, it is implemented for hackers working for the government.

Two security expert – Jess Endal (Jesse Endahl) of the company Fleetsmith and Max Bellange (Max Belanger),a Dropbox employee, demonstrated at the conference Black Hat, how to compromise a new Apple MacBook in a corporate environment when you first use them and you first connect to the local network.

The experts used the MDM Protocol is Apple to extract the manifest and the substitution requested by the victim to malicious applications.MDM allows corporate administrators to remotely manage devices based on the macOS and iOS, including install and uninstall apps, lock the device or reset them to factory settings.

Every time to the corporate network adds a new device, it gets the “profile settings”. This operation is performed automatically by the program Device Enrollment Program (DEP).

Computers running macOS automatically connect to MDM server during the first boot or after factory reset. The profile of the DEP, which is forwarded to the device, is formed on the MDM server automatically and includes information relating to the installation (the URL of the server certificates, etc.).

Using the InstallApplication command, administrators can install specialized applications. This command uses the URL-manifest, in response to receiving the XML file containing all the information necessary to install the application.

Experts have demonstrated that using a MitM attack in this Manifesto can be manipulated and, accordingly, to replace the installed applications. To make such an attack difficult, experts say, but is quite real – at least for professional criminals, including working for the secret services.

Apple has received information in April 2018 and the beginning of may confirmed the validity of the conclusions of Endal and Bellange. Updating macOS 10.13.6 this “bug” was fixed: the MDM-system of Apple now equipped with a team InstallEnterpriseApplication, which allows providers of MDM solutions to provide special certificates to bind a query to ManifestURL. Thus, the possibility of substitution application is removed.

“Laptops on the basis of the macOS are interested in all sorts of attacks because most likely in a corporate environment these will be used by policy makers, through which passes the key information, – said Oleg Galushkin, an expert on information security company SEC Consult Services. – Therefore, even if the execution of such attacks by ordinary hackers are inaccessible to underestimate the degree of threat from it is not worth it.”

© 2018, paradox. All rights reserved.

paradox

Share
Published by
paradox

Recent Posts

NATO soldiers operating in Ukraine – Polish PM

NATO soldiers are already in Ukraine helping Kiev but the US-led bloc does not want…

4 hours ago

Western revanchism and history lessons: Takeaways from Russia’s Victory Day parade

Russia has celebrated the 79th anniversary of victory over Nazi Germany in World War II…

13 hours ago

Russian military reports new gains in Ukraine’s Kharkov Region

The Russian military has seized two settlements in Kharkov Region and Donbass from Ukrainian forces,…

1 day ago

AstraZeneca withdraws Covid vaccine worldwide

AstraZeneca pharmaceutical company has announced the withdrawal of its Covid-19 vaccine from global markets, claiming…

2 days ago

WATCH Russian drone strike US-made Abrams tank

A video documenting the destruction of a NATO-supplied tank in Ukrainian service appeared on Russian…

2 days ago

Relations with West, national resilience and forging victory: Key takeaways from Putin’s inauguration

Russian President Vladimir Putin has officially been sworn into office for a fifth term. In…

2 days ago