Hackers Exploit The Powerdir Flaw For Access To MacOS Data

Share post:

The Microsoft 365 Defender Research Team has discovered a flaw known as powedir.

The bug, a macOS vulnerability, allows threat actors to gain access to the user’s protected data.

Attackers can do this by bypassing Transparency, Consent, and Control (TCC) technology. TCC was created to block apps from accessing sensitive user data.

The technology achieves this goal by allowing macOS users to configure privacy settings for the apps installed on their systems and devices connected to their Macs.

Apple has restricted TCC access to only apps with full disk access. Apple has also set up features to automatically block unauthorized code execution.

However, Microsoft researchers have shown that attackers can create a second, specially crafted TCC database that allows them to access protected user information.

“If exploited on unpatched systems, this vulnerability could allow a malicious actor to potentially orchestrate an attack based on the user’s protected personal data,” said Jonathan Bar Or, a principal security researcher at Microsoft.

For more information, read the original story in BleepingComputer.

SUBSCRIBE NOW

Related articles

Sleeper Supply Chain Attack Activates After 6 Years

A coordinated supply chain attack has compromised between 500 and 1,000 e-commerce websites by exploiting vulnerabilities in 21...

Russian-Controlled Open Source Tool Raises Alarms Over U.S. Cybersecurity

A widely used open-source Go library, easyjson, used in healthcare, finance and even defence has come under scrutiny...

Signal Archiving Tool Used By Trump Admin Is Breached, Raising Alarms Over Messaging Security (EDITORIAL)

(EDITORIAL) A messaging tool used by Trump administration officials to archive encrypted Signal messages has been hacked —...

Anthropic Warns: AI “Virtual Employees” Could Pose Security Risks Within a Year

Anthropic, a leading artificial intelligence company, anticipates that AI-powered virtual employees could begin operating within corporate networks as...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways