Apple's automated notarization process mistakenly approved Mac malware

Posted:
in General Discussion edited August 2020
Security researchers have discovered that Apple's macOS app notarization process has mistakenly approved a piece of malware disguised as a Flash installer.

Apple mistakenly approves Mac malware in notarization.
Apple mistakenly approves Mac malware in notarization.


Apple requires Mac app developers -- even those outside of the App Store -- to submit apps for notarization, which checks them for security issues and malicious code. If they don't pass notarization, apps will be blocked by Gatekeeper.

But macOS security researcher Patrick Wardle and Twitter user Peter Dantini have found that at least one piece of malicious code appears to slipped through Apple's safeguards.

On Friday, Dantini noticed that a Flash installer adware campaign actually featured malicious code that was notarized by Apple. The effect of that notarization is that the installer wouldn't be blocked by the built-in Gatekeeper security function. If a user clicked on it, the installer would simply run and deliver its payload on a system.

Wardle confirmed that the approved code contained within the malware has been used by the Shlayer adware, which has been said to be the top malicious threat to Mac users. Shlayer works by intercepting web traffic and replacing ads with its own, fraudulently making money for operators.

As he pointed out in his blog post, Wardle says that the approval is "a first." Apple, for its parts, has said that notarization isn't an app review. It's a much quicker and automated process that scans for malware or code-signing issues.

Basically, Apple's notarization process failed to detect the malicious code when it was submitted. In effect, the malware was approved to run on Mac devices -- even those running beta versions of macOS Big Sur.

Apple revoked the malware's notarization after Wardle reached out. In a statement to TechCrunch, Apple applauded Wardle's effort.
"Malicious software constantly changes, and Apple's notarization system helps us keep malware off the Mac and allow us to respond quickly when it's discovered. Upon learning of this adware, we revoked the identified variant, disabled the developer account, and revoked the associated certificates. We thank the researchers for their assistance in keeping our users safe."
As Apple admits, malware constantly changes -- so it's likely that bad actors will again submit malicious payloads to Apple's notarization process. Wardle said that at least some of those payloads may get notarized.
mwhite

Comments

  • Reply 1 of 18
    cpsrocpsro Posts: 3,198member
    IMO it's a bit much to write "our users" [emphasis added]. Like we're cattle (or chattel?).
    edited August 2020
  • Reply 2 of 18
    robin huberrobin huber Posts: 3,960member
    Why would anyone install Flash?
    dewmewatto_cobra
  • Reply 3 of 18
    killroykillroy Posts: 276member
    Why would anyone install Flash?

    Believe it or not some web sites still use flash.
  • Reply 4 of 18
    FatmanFatman Posts: 513member
    I will share this code with Apple for their automated approval logic, at no charge !

    if code contains ‘flash’ or appname = ‘flash updater’ then do not approve
    watto_cobra
  • Reply 5 of 18
    BeatsBeats Posts: 3,073member
    This is gonna be a media field day while everyone ignores the barrage of Windows/Android malware running wild.

    Still, wondering why the "no viruses" Mac has been having so many security holes lately.
  • Reply 6 of 18
    Rayz2016Rayz2016 Posts: 6,957member
    killroy said:
    Why would anyone install Flash?

    Believe it or not some web sites still use flash.
    Then the best thing to do is avoid those websites.
    watto_cobra
  • Reply 7 of 18
    gatorguygatorguy Posts: 24,213member
    Of some note, Apple revoked the code-signing certificate on Friday the 28th which should have blocked any malicious activity going forward. But it didn't.

    "Interestingly, as of Sunday (Aug 30th) the adware campaign was still live and serving up new payloads. Unfortunately these new payloads are (still) notarized: Both the old and “new” payload(s) appears to be nearly identical, containing OSX.Shlayer packaged with the Bundlore adware."

    "However the attackers’ ability to agilely continue their attack (with other notarized payloads) is noteworthy. Clearly in the never ending cat & mouse game between the attackers and Apple, the attackers are currently (still) winning. "

    muthuk_vanalingamviclauyyc
  • Reply 8 of 18
    Seems like Apple needs to update the malware definitions for Notarization.  Automated malware detection is only as good as it's definitions.  If the definitions aren't good, the automated detection is more a detriment than a benefit because it fosters a false sense of security.
    razorpit
  • Reply 9 of 18
    Rayz2016Rayz2016 Posts: 6,957member

    Beats said:
    This is gonna be a media field day while everyone ignores the barrage of Windows/Android malware running wild.

    Still, wondering why the "no viruses" Mac has been having so many security holes lately.

    Because malicious coders are working much harder to infect the ecosystem with the users who actually buy stuff.

    And when did Apple say the Mac has no viruses? They certainly haven't said it in the last five years, if ever.

    The trick is to make it harder to infect the platform (in case you wondered why Apple is trying to get everything to run through an app store) and mitigate the damage they cause if they do slip through.

    A good example of that is when Zoom installed a web server (a web server for cripes sake!) during the installation of the Zoom client.  When Zoom was dragging its feet to remove it, Apple stepped in and issued a compulsory update that wiped it.

    Mitigation.

    watto_cobra
  • Reply 10 of 18
    razorpitrazorpit Posts: 1,796member
    Why would anyone install Flash?
    Let’s be real. Most users have no idea what the hell they are putting on their machines. Windows, Mac, iOS, it doesn’t matter.
    muthuk_vanalingamkillroyviclauyycwatto_cobra
  • Reply 11 of 18
    mcdavemcdave Posts: 1,927member
    Why TF is anyone still installing Flash?
    watto_cobra
  • Reply 12 of 18
    dewmedewme Posts: 5,373member
    Rayz2016 said:

    Beats said:
    This is gonna be a media field day while everyone ignores the barrage of Windows/Android malware running wild.

    Still, wondering why the "no viruses" Mac has been having so many security holes lately.

    Because malicious coders are working much harder to infect the ecosystem with the users who actually buy stuff.

    And when did Apple say the Mac has no viruses? They certainly haven't said it in the last five years, if ever.

    The trick is to make it harder to infect the platform (in case you wondered why Apple is trying to get everything to run through an app store) and mitigate the damage they cause if they do slip through.

    A good example of that is when Zoom installed a web server (a web server for cripes sake!) during the installation of the Zoom client.  When Zoom was dragging its feet to remove it, Apple stepped in and issued a compulsory update that wiped it.

    Mitigation.

    Adding to Rayz2016's post... 

    Using the "so many security holes lately" argument as an implication of a general decline in quality is a classic example of the Availability Heuristic in action. It's a natural reaction for people to place greater emphasis on recently reported and/or frequently reported (or claimed) issues regardless of their actual statistical rate of occurrence. There is no question that the number of malware infections on the Windows platform is much greater than what has been seen on the Mac, for whatever reason. This amplifying effect is very prevalent with the reporting of crimes, as we see now with a number of Apple Store related robberies, or the perception of isolated lawlessness being conflated into a general increase in lawlessness or the indication of a broader trend. 

    This specific slip-up in the App Store vetting process is a genuine failure, and also a painfully ironic one considering Apple's stance on its customers using the deeply flawed Flash technology on Apple platforms. But yes indeed, it happened and Apple now has to scrape the stink off its shoes. There is obviously a nonzero failure rate inherent to Apple's notarization process and this is one that slipped through the cracks. People make mistakes and systems developed directly or indirectly by people make mistakes on behalf of their creators. Apple can probably drive down the failure rate - but by how much and at what cost? Only Apple can answer these questions.
    edited August 2020
  • Reply 13 of 18
    digitoldigitol Posts: 276member
    I've downloaded apps from the Appstore with malware on it on numerous occasion. Apple touts "security" and the Appstore as a "safe" place to download software, but in fact it is not. False sense of security is dangerous, and frankly not worth the crippling of software via Apple's Appstore guidelines. Bottom-line, if you are a casual or toy user of tech, Apple is the way to go. If you need to get your hands dirty, and really get into things... Appstore falls short. Thankfully you can download from other sources like macupdate.com .... however I fear come Apple-Silicon/Big-Sur macs, this option may be closed..forcing Apple Apstore downloads always. Sure there may be "hacks/jailbreaking" but what a mess all that is. Apple used to be fun.

  • Reply 14 of 18
    cpsro said:
    IMO it's a bit much to write "our users" [emphasis added]. Like we're cattle (or chattel?).
    I think you must be lost.

    Aren’t you looking to post that drivel on MacRumors or Slashdot? You’ll find your type over there.
    killroywatto_cobra
  • Reply 15 of 18
    digitol said:
    I've downloaded apps from the Appstore with malware on it on numerous occasion.

    Amazing that you are the only one that has ever reported it!

    Gimme a break.
    killroysvanstromwatto_cobra
  • Reply 16 of 18
    cpsrocpsro Posts: 3,198member
    cpsro said:
    IMO it's a bit much to write "our users" [emphasis added]. Like we're cattle (or chattel?).
    I think you must be lost.

    Aren’t you looking to post that drivel on MacRumors or Slashdot? You’ll find your type over there.
    What type am I?
  • Reply 17 of 18
    cpsro said:
    IMO it's a bit much to write "our users" [emphasis added]. Like we're cattle (or chattel?).
    Welcome to recently having learned the English language; what you're experiencing right there is just normal phrasing, and shouldn't in and off itself make you feel reduced to someone not able to think for themselves.
    watto_cobra
  • Reply 18 of 18
    This article is not about a macOS "Virus".  Downloading an app, installing the app, and providing admin privileges for the install, is not a virus.  Doing these steps and getting harmful/unintended functionality is a Trojan.

    No need to mention/discuss viruses, related to this article/malware. 
    svanstromwatto_cobra
Sign In or Register to comment.