{"id":24223,"date":"2019-02-07T16:09:57","date_gmt":"2019-02-07T21:09:57","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=24223"},"modified":"2021-07-13T11:52:55","modified_gmt":"2021-07-13T15:52:55","slug":"keysteal-mac-keychain-exploit","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2019\/02\/07\/keysteal-mac-keychain-exploit\/","title":{"rendered":"KeySteal Mac Keychain Exploit"},"content":{"rendered":"<p><a href=\"https:\/\/9to5mac.com\/2019\/02\/06\/mac-keychain-exploit\/\">Benjamin Mayo<\/a>:<\/p>\n<blockquote cite=\"https:\/\/9to5mac.com\/2019\/02\/06\/mac-keychain-exploit\/\">\n<p>Security researcher Linuz Henze has <a href=\"https:\/\/twitter.com\/LinusHenze\/status\/1092152785318100992\">shared a video<\/a> demonstration of what is claimed to be a <a href=\"https:\/\/9to5mac.com\/guides\/macos-mojave\/\">macOS Mojave<\/a> exploit to access passwords stored in the Keychain. However, he has said he is not sharing his findings with Apple out of protest.<\/p>\n<p>Henze has publicly shared legitimate iOS vulnerabilities in the past, so he has a track record of credibility.<\/p>\n<p>However, Henze is frustrated that Apple&rsquo;s bug bounty program only applies to iOS, not macOS, and has decided not to release more information about his latest Keychain invasion.<\/p>\n<\/blockquote>\n\n<p>Why <a href=\"https:\/\/macperformanceguide.com\/blog\/2019\/20190204_2018-macOS-AppleCoreRot-StealAllYourPasswords.html\">doesn&rsquo;t<\/a> Apple have a bug bounty program for macOS?<\/p>\n\n<p><a href=\"https:\/\/twitter.com\/reneritchie\/status\/1093267168504930305\">Rene Ritchie<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/reneritchie\/status\/1093267168504930305\">\n<p>Garbage. Disclose to Apple to help protect users then use the follow up to push for when (not if) the bounty program is launching.<\/p>\n<p>There absolutely should be one and yesterday but don&rsquo;t hold users hostage for your entitlement.<\/p>\n<p>(Especially if you&rsquo;ve previously dropped 0days&#8230;)<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/davedelong\/status\/1093270167717502976\">Dave DeLong<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/davedelong\/status\/1093270167717502976\">\n<p>Eh, mixed feelings. Civil disobedience is a well-established form of protest, and @apple tends to gloss over Mac stuff publicly, because it&rsquo;s minuscule compared to iOS<\/p>\n<p>And until he releases the exploit, there are no &ldquo;hostages&rdquo;. This isn&rsquo;t blackmail.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/patrickwardle\/status\/1093267739089588226\">Patrick Wardle<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/patrickwardle\/status\/1093267739089588226\">\n<p>Got to play with @LinusHenze&rsquo;s &lsquo;KeySteal&rsquo;. It&rsquo;s a lovely bug &amp; exploit<\/p>\n<p>&#x2705; works on macOS 10.14.3<br \/>\n&#x2705; his payload dumps passwords, private keys, &amp; tokens<\/p>\n<p>Protect yourself by:<\/p>\n<p>&#x1F510;manually locking your keychain<br \/>\n&#x1F510;or setting a keychain-specific password<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/7xqdxe\/google-project-zero-hacker-iphone-bug-bounty\">Lorenzo Franceschi-Bicchierai<\/a> (<a href=\"https:\/\/news.ycombinator.com\/item?id=17724465\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/motherboard.vice.com\/en_us\/article\/7xqdxe\/google-project-zero-hacker-iphone-bug-bounty\">\n<p>On Wednesday, after a talk at the Black Hat security conference in Las Vegas, Beer tweeted a message to Apple&rsquo;s CEO Tim Cook, challenging him to pay for each bug he has reported since 2016, and asking him to donate $2.45 million to to human rights group Amnesty International.<\/p>\n<p>[&#8230;]<\/p>\n<p>Apple&rsquo;s bug bounty program had a lackluster start last year. As Motherboard reported at the time, the majority of independent iOS security researchers had not submitted any bugs to Apple as part of the bug bounty, mostly because doing so would hinder future research and was just not worth the trouble, given that those exploits can be sold for much more money in the gray market of exploit brokers.<\/p>\n<\/blockquote>\n\n<p>Previously: <a href=\"https:\/\/mjtsai.com\/blog\/2016\/08\/15\/apple-security\/\">Apple Security<\/a>.<\/p>\n\n<p id=\"keysteal-mac-keychain-exploit-update-2019-02-08\">Update (2019-02-08): <a href=\"https:\/\/twitter.com\/bzamayo\/status\/1093604808265789441\">Benjamin Mayo<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/bzamayo\/status\/1093604808265789441\">\n<p>It is pretty twisted that Apple will bend the rules of their own bug bounty program so much for the Thompson family because of the press coverage. Meanwhile, &lsquo;real&rsquo; security researchers are upset that Apple won&rsquo;t even offer a program &mdash; of any kind &mdash; for macOS.<\/p>\n<\/blockquote>\n\n<p>Previously: <a href=\"https:\/\/mjtsai.com\/blog\/2019\/01\/29\/major-facetime-privacy-bug\/\">Major FaceTime Privacy Bug<\/a>.<\/p>\n\n<p><a href=\"https:\/\/lapcatsoftware.com\/articles\/still-no-credit.html\">Jeff Johnson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/lapcatsoftware.com\/articles\/still-no-credit.html\"><p>I could continue to pester Apple Product Security by email, but I don&rsquo;t feel like it. I shouldn&rsquo;t have to. I shouldn&rsquo;t have to do anything except report the bug, which I did. I can accept that a mistake was made when my bug was not credited along with all of the others on October 30. What I cannot accept is that it takes more than 3 months to fix the mistake and simply update a web page on their site.<\/p><p>On a tangentially related note, the scam apps in the App Store that I blogged about previously are still in the App Store today. I also reported these apps to Apple Product Feedback. I&rsquo;m not sure if that&rsquo;s where you&rsquo;re supposed to report App Store scams. Should you email Apple Product Security? Who knows. Why isn&rsquo;t there a clearly identified place to report App Store scams to Apple?<\/p><\/blockquote>\n\n<p id=\"keysteal-mac-keychain-exploit-update-2019-02-11\">Update (2019-02-11): <a href=\"https:\/\/twitter.com\/LinusHenze\/status\/1093979827286278144\">Linus Henze<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/LinusHenze\/status\/1093979827286278144\">\n<p>On Tuesday @Apple contacted me and asked me if I would send them the details about my exploit. I told them that I would if they accept my offer. However, I&rsquo;ve got no response from them. Today I wrote them again. Attached is an image of what I wrote.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/daringfireball.net\/linked\/2019\/02\/07\/henze-keychain-exploit\">John Gruber<\/a>:<\/p>\n<blockquote cite=\"https:\/\/daringfireball.net\/linked\/2019\/02\/07\/henze-keychain-exploit\">\n<p>Why in the world Apple only offers security bounties for iOS is beyond my comprehension. Of course iOS has the most users, but the potential for truly critical bugs exists on all of Apple&rsquo;s platforms.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/twitter.com\/qwertyoruiopz\/status\/1094125454347436032\">qwertyoruiop<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/qwertyoruiopz\/status\/1094125454347436032\">\n<p>as much as the FaceTime kid deserves the money he got, it&rsquo;s very sad to see that Apple will only do things under the threat of bad PR. The bounty program has pissed off so many researchers that it seems very tone deaf of Apple to bend rules like that.<\/p>\n<p>I&rsquo;m not supposed to share details, but at this point I don&rsquo;t even care about being disqualified from the bounty program. I submitted two sandbox escapes, for a $25k payout each. Additionally I wanted to donate my payout to charity, which made me elegible for a match.<\/p>\n<p>It&rsquo;s been now 2 years of silence from them, but I did recently hear that supposedly they took my decision to donate to @MAPS as a &ldquo;joke&rdquo; and seemingly they&rsquo;re unwilling to donate to them. I think it&rsquo;s despicable and the bounty program can die in a fire as far as I&rsquo;m concerned.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/lapcatsoftware.com\/articles\/mojave-privacy3.html\">Jeff Johnson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/lapcatsoftware.com\/articles\/mojave-privacy3.html\">\n<p>Yesterday I wrote a blog post about how Apple Product Security has failed to credit me for my previous discovery of another hole in Mojave&rsquo;s privacy protections. Later that day, Apple updated their support article online. The article now credits me, but unfortunately it credits me for the wrong bug. Perhaps the update was a rush job in response to my blog post, who knows.<\/p>\n<\/blockquote>\n\n<p id=\"keysteal-mac-keychain-exploit-update-2019-02-18\">Update (2019-02-18): <a href=\"https:\/\/lapcatsoftware.com\/articles\/still-no-credit.html\">Jeff Johnson<\/a>:<\/p>\n<blockquote cite=\"https:\/\/lapcatsoftware.com\/articles\/still-no-credit.html\">\n<p>I finally got proper credit from Apple Product Security for the Mojave privacy protections bypass that was fixed in macOS 10.14.1 back on October 30, 2018.<\/p>\n<\/blockquote>\n\n<p id=\"keysteal-mac-keychain-exploit-update-2019-03-04\">Update (2019-03-04): <a href=\"https:\/\/twitter.com\/LinusHenze\/status\/1101223563581943808\">Linus Henze<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/LinusHenze\/status\/1101223563581943808\">\n<p>I&rsquo;ve decided to submit my keychain exploit to @Apple, even though they did not react, as it is very critical and because the security of macOS users is important to me. I&rsquo;ve sent them the full details including a patch. For free of course.<\/p>\n<\/blockquote>\n\n<p id=\"keysteal-mac-keychain-exploit-update-2019-06-03\">Update (2019-06-03): <a href=\"https:\/\/twitter.com\/LinusHenze\/status\/1135108237261451264\">Linus Henze<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/LinusHenze\/status\/1135108237261451264\">\n<p>Hopefully you all updated your Macs to the latest macOS version, because as promised in my talk at #OBTS, KeySteal is now <a href=\"https:\/\/github.com\/LinusHenze\/Keysteal\">available on Github<\/a>.<\/p>\n<p>Please, only use this exploit for educational purposes. Don&rsquo;t be evil!<\/p>\n<\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Benjamin Mayo: Security researcher Linuz Henze has shared a video demonstration of what is claimed to be a macOS Mojave exploit to access passwords stored in the Keychain. However, he has said he is not sharing his findings with Apple out of protest. Henze has publicly shared legitimate iOS vulnerabilities in the past, so he [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2019-02-07T21:09:59Z","apple_news_api_id":"023aa5f2-d2ed-4618-af90-c0430650f31b","apple_news_api_modified_at":"2021-07-13T15:52:59Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAABw==","apple_news_api_share_url":"https:\/\/apple.news\/AAjql8tLtRhivkMBDBlDzGw","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[2098,131,2095,1583,30,1609,355],"class_list":["post-24223","post","type-post","status-publish","format-standard","hentry","category-technology","tag-apple-security-bounty","tag-bug","tag-exploit","tag-keychain","tag-mac","tag-macos-10-14","tag-privacy"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/24223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=24223"}],"version-history":[{"count":7,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/24223\/revisions"}],"predecessor-version":[{"id":25455,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/24223\/revisions\/25455"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=24223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=24223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=24223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}