Office Drama on macOS

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=tKB9n6LJScM



Duration: 42:44
11 views
0


Patrick Wardle | Principal Security Researcher, Jamf
Date: Wednesday, August 5 | 2:30pm-3:10pm
Format: 40-Minute Briefings
Tracks: Malware, Exploit Development

In the world of Windows, macro-based Office attacks are well understood (and frankly are rather old news). However on macOS though such attacks are growing in popularity and are quite en vogue, they have received far less attention from the research and security community.

In this talk, we will begin by analyzing recent macro-laden documents targeting Apple's desktop OS, highlighting the macOS-specific exploit code and payloads. Though sophisticated APT groups are behind several of these attacks, these malicious documents and their payloads remain severely constrained by recent application and OS-level security mechanisms.

However, things could be far worse! Here, we'll detail the creation of a powerful exploit chain that began with CVE-2019-1457, leveraged a new sandbox escape and ended with a full bypass of Apple's stringent notarization requirements. Triggered by simply opening a malicious (macro-laced) Office document, no alerts, prompts, nor other user interactions were required in order to persistently infect even a fully-patched macOS Catalina system!

To conclude, we'll explore Apple's new Endpoint Security Framework illustrating how it can beleveraged to thwart each stage of our exploit chain, as well as generically detect advanced "document-delivered" payloads and even persistent nation-state malware!

Black Hat - USA - 2020 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-01-09EtherOops: Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks
2022-01-09Exploiting Kernel Races through Taming Thread Interleaving
2022-01-09Needing the DoH: The Ongoing Encryption and Centralization of DNS
2022-01-09Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa
2022-01-09FASTCash and INJX Pure How Threat Actors Use Public Standards for Financial Fraud
2022-01-09CloudLeak: DNN Model Extractions from Commercial MLaaS Platforms
2022-01-09NoJITsu: Locking Down JavaScript Engines
2022-01-09Carrying our Insecurities with Us The Risks of Implanted Medical Devices in Secure Spaces
2022-01-09Finding New Bluetooth Low Energy Exploits via Reverse Engineering Multiple Vendors' Firmwares
2022-01-09Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
2022-01-09Office Drama on macOS
2022-01-09Fooling Windows through Superfetch
2022-01-09A Decade After Stuxnet's Printer Vulnerability Printing is Still the Stairway to Heaven
2022-01-09Decade of the RATs Custom Chinese Linux Rootkits for Everyone
2022-01-09Hacking Public Opinion
2022-01-09IMP4GT IMPersonation Attacks in 4G NeTworks
2022-01-09A Framework for Evaluating and Patching the Human Factor in Cybersecurity
2022-01-09Demigod The Art of Emulating Kernel Rootkits
2022-01-09A Hacker's Guide to Reducing Side Channel Attack Surfaces Using Deep Learning
2022-01-09Improving Mental Models of End to End Encrypted Communication
2022-01-09Hacking the Supply Chain The Ripple20 Vulnerabilities Haunt Tens of Millions of Critical Devices



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
information
hack
online
password
code
web
concept
thief
protection
scam
fraud
malware
secure
criminal
phishing
software
safety
theft
system
firewall
privacy
binary
account
spy
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Patrick Wardle
macOS
Office Drama
Exploit Development
Malware