Friday, April 23, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Privacy

How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera

April 4, 2020
in Internet Privacy
How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

If you use Apple iPhone or MacBook, here we have a piece of alarming news for you.

Turns out merely visiting a website — not just malicious but also legitimate sites unknowingly loading malicious ads as well — using Safari browser could have let remote attackers secretly access your device’s camera, microphone, or location, and in some cases, saved passwords as well.

You might also like

Researchers Find Additional Infrastructure Used By SolarWinds Hackers

Facebook Busts Palestinian Hackers’ Operation Spreading Mobile Spyware

Hackers Exploit Unpatched Pulse Secure 0-Day to Breach Organizations

Apple recently paid a $75,000 bounty reward to an ethical hacker, Ryan Pickren, who practically demonstrated the hack and helped the company patch a total of seven new vulnerabilities before any real attacker could take advantage of them.

The fixes were issued in a series of updates to Safari spanning versions 13.0.5 (released January 28, 2020) and Safari 13.1 (published March 24, 2020).

“If the malicious website wanted camera access, all it had to do was masquerade as a trusted video-conferencing website such as Skype or Zoom,” Pickren said.

When chained together, three of the reported Safari flaws could have allowed malicious sites to impersonate any legit site a victim trusts and access camera or microphone by abusing the permissions that were otherwise explicitly granted by the victim to the trusted domain only.

An Exploit Chain to Abuse Safari’s Per-Site Permissions

Safari browser grants access to certain permissions such as camera, microphone, location, and more on a per-website basis. This makes it easy for individual websites, say Skype, to access the camera without asking for the user’s permission every time the app is launched.

But there are exceptions to this rule on iOS. While third-party apps must require user’s explicit consent to access the camera, Safari can access the camera or the photo gallery without any permission prompts.

Specifically, improper access is made possible by leveraging an exploit chain that stringed together multiple flaws in the way the browser parsed URL schemes and handled the security settings on a per-website basis. This method only works with websites that are currently open.

“A more important observation was that the URL’s scheme is completely ignored,” Pickren noted. “This is problematic because some schemes don’t contain a meaningful hostname at all, such as file:, javascript:, or data:.”

Put another way, Safari failed to check if the websites adhered to the same-origin policy, thereby granting access to a different site that shouldn’t have obtained permissions in the first place. As a result, a website such as “https://example.com” and its malicious counterpart “fake://example.com” could end up having the same permissions.

Thus, by taking advantage of Safari’s lazy hostname parsing, it was possible to use a “file:” URI (e.g., file:///path/to/file/index.html) to fool the browser into changing the domain name using JavaScript.

“Safari thinks we are on skype.com, and I can load some evil JavaScript. Camera, Microphone, and Screen Sharing are all compromised when you open my local HTML file,” Pickren said.

The research found that even plaintext passwords can be stolen this way as Safari uses the same approach to detect websites on which password auto-fill needs to be applied.

Furthermore, auto-download preventions can be bypassed by first opening a trusted site as a pop-up, and subsequently using it to download a malicious file.

Likewise, a “blob:” URI (e.g. blob://skype.com) can be exploited to run arbitrary JavaScript code, using it to directly access the victim’s webcam without permission.

In all, the research uncovered seven different zero-day vulnerabilities in Safari —

  • CVE-2020-3852: A URL scheme may be incorrectly ignored when determining multimedia permission for a website
  • CVE-2020-3864: A DOM object context may not have had a unique security origin
  • CVE-2020-3865: A top-level DOM object context may have incorrectly been considered secure
  • CVE-2020-3885: A file URL may be incorrectly processed
  • CVE-2020-3887: A download’s origin may be incorrectly associated
  • CVE-2020-9784: A malicious iframe may use another website’s download settings
  • CVE-2020-9787: A URL scheme containing dash (-) and period (.) adjacent to each other is incorrectly ignored when determining multimedia permission for a website

If you are a Safari user, it’s recommended that you keep the browser up-to-date and ensure websites are granted access to only those settings which are essential for them to function.


Credit: The Hacker News By: noreply@blogger.com (Ravie Lakshmanan)

Previous Post

COVID-19 and the Importance of “Obsolete” Data

Next Post

Ransomware and DDoS attacks: Cybercrooks are stepping up their activities in the midst of coronavirus

Related Posts

1-Click Hack Found in Popular Desktop Apps — Check If You’re Using Them
Internet Privacy

Researchers Find Additional Infrastructure Used By SolarWinds Hackers

April 22, 2021
Facebook Busts Palestinian Hackers’ Operation Spreading Mobile Spyware
Internet Privacy

Facebook Busts Palestinian Hackers’ Operation Spreading Mobile Spyware

April 22, 2021
Hackers Exploit Unpatched Pulse Secure 0-Day to Breach Organizations
Internet Privacy

Hackers Exploit Unpatched Pulse Secure 0-Day to Breach Organizations

April 22, 2021
Hackers threaten to leak stolen Apple blueprints if $50 million ransom isn’t paid
Internet Privacy

Hackers threaten to leak stolen Apple blueprints if $50 million ransom isn’t paid

April 22, 2021
Improve Your Cyber Security Posture by Combining State of the Art Security Tools
Internet Privacy

Improve Your Cyber Security Posture by Combining State of the Art Security Tools

April 21, 2021
Next Post
Paradise ransomware: Now victims can get their files back for free with this decryption tool

Ransomware and DDoS attacks: Cybercrooks are stepping up their activities in the midst of coronavirus

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Basic laws of physics spruce up machine learning
Machine Learning

Can machine learning improve debris flow warning?

April 23, 2021
58 Resources To Help Get Started With Deep Learning ( In TF ) | by Shubham Panchal | Apr, 2021
Neural Networks

58 Resources To Help Get Started With Deep Learning ( In TF ) | by Shubham Panchal | Apr, 2021

April 23, 2021
An ideal time for online events to get a makeover
Digital Marketing

What do attendees want from your presentation?: Thursday’s daily brief

April 23, 2021
SolarWinds hack analysis reveals 56% boost in command server footprint
Internet Security

SolarWinds hack analysis reveals 56% boost in command server footprint

April 22, 2021
1-Click Hack Found in Popular Desktop Apps — Check If You’re Using Them
Internet Privacy

Researchers Find Additional Infrastructure Used By SolarWinds Hackers

April 22, 2021
What Does The Future Hold For the Companies Developing Mobile Apps
Data Science

What Does The Future Hold For the Companies Developing Mobile Apps

April 22, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Can machine learning improve debris flow warning? April 23, 2021
  • 58 Resources To Help Get Started With Deep Learning ( In TF ) | by Shubham Panchal | Apr, 2021 April 23, 2021
  • What do attendees want from your presentation?: Thursday’s daily brief April 23, 2021
  • SolarWinds hack analysis reveals 56% boost in command server footprint April 22, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates