April 21, 2016 By Douglas Bonderud 2 min read

OS X has detractors and champions. Some laud the arm’s-length distance between users and fundamental processes, while others regard this distance as a failure waiting to happen when security threats breach the gate-kept trunk of Apple’s tree.

Both camps may have a point. Here’s a roundup of the good, the bad and the ugly security news for OS X.

The Good…

As noted by Threatpost, security researcher Partrick Wardle has developed a generic ransomware detection tool for the operating system. This is a kind of holy grail for ransomware spotting: It’s a tool that doesn’t depend on identifying specific strains but generalizes based on app behavior and stops offending processes before they get too far.

While OS X faces fewer ransomware attacks than its PC counterparts, Wardle’s RansomWhere? defense is still a step in the right direction. The researcher decided to act after he watched KeRanger sneak through Gatekeeper using a legitimate Apple developer ID.

RansomWhere? starts by determining whether a process is trustworthy — for example, those processes signed by Apple or directly approved by users. Unapproved apps are then monitored. If they start to encrypt files at high speed, they’re halted and a notification is sent to users.

Wardle pointed out that some files will be lost as the tool scans existing processes. His solution isn’t perfect since it can be bypassed, but overall it’s good news on the defense front.

The Bad…

On the bad side is old Git source code that’s included as part of the Command Line Tools package for Xcode, which is used by developers who create apps for OS X or iOS. According to CSO Online, the most recent version of the package comes with Git version 2.6.4, released in December 2015. But last month, two serious flaws — CVE-2016-2315 and CVE-2016-2324 — were discovered.

On the client side, these vulnerabilities make it possible for attackers to carry out remote code attacks, so on March 17, Git released version 2.7.4, which fixed both issues.

The problem? The Command Line Tools haven’t been updated to reflect this change. It’s also not easy to update Git alone on an Apple device, meaning both developers and new applications could be at risk.

…The Ugly

To address concerns over OS X hacks, Apple recently implemented the System Integrity Protocol (SIP), which prevents the modification of specific programs in certain directories even with root access.

As noted by TechWeekEurope UK, however, all OS and iOS versions earlier than 10.11.4 and 9.3 contain a flaw that allows attackers to escalate their privileges and bypass SIP using a phishing or browser attack. It also enables them to evade detection by other security programs. If users don’t update to the newest OS versions — released just last month — their mobile device or laptop could be modified without their knowledge or consent.

Good news? OS X got a generic ransomware detector. Not-so-good news? Outdated Git code and a vulnerable SIP could put users at serious risk.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today