{"id":122083,"date":"2021-04-29T15:22:27","date_gmt":"2021-04-29T22:22:27","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/04\/hackers-use-a-bug-to-evade-macos-defenses"},"modified":"2021-04-29T15:22:27","modified_gmt":"2021-04-29T22:22:27","slug":"hackers-use-a-bug-to-evade-macos-defenses","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/04\/hackers-use-a-bug-to-evade-macos-defenses","title":{"rendered":"Hackers use a bug to evade macOS defenses"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/hackers-use-a-bug-to-evade-macos-defenses3.jpg\"><\/a><\/p>\n<p>Lauded for years as the system able to best prevent malware infection, macOS recently fell victim to an operating system vulnerability that hackers used to circumvent all of Apple\u2019s system defenses.<\/p>\n<p>Security researcher Cedric Owens discovered this bug in March 2021 while assessing Apple\u2019s Gatekeeper mechanism, a safeguard that will only allow developers to run their <a href=\"https:\/\/techxplore.com\/tags\/software\/\" rel=\"tag\" class=\"\">software<\/a> on Macs after registering with Apple and paying a fee. Moreover, the company requires that all applications undergo an automated vetting process to further protect against malicious software.<\/p>\n<p>Unfortunately, Owens uncovered a logic flaw in the macOS itself, rather than the <a href=\"https:\/\/techxplore.com\/tags\/defense+systems\/\" rel=\"tag\" class=\"\">defense systems<\/a>. The bug allowed attackers to develop <a href=\"https:\/\/techxplore.com\/tags\/malware\/\" rel=\"tag\" class=\"\">malware<\/a> able to deceive the operating system into running their malware regardless of whether they passed Apple\u2019s safety checks. Indeed, this flaw resembles a door that has been securely locked and bolted but still has a small pet door at the bottom through which you can break in or insert a bomb.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Lauded for years as the system able to best prevent malware infection, macOS recently fell victim to an operating system vulnerability that hackers used to circumvent all of Apple\u2019s system defenses. Security researcher Cedric Owens discovered this bug in March 2021 while assessing Apple\u2019s Gatekeeper mechanism, a safeguard that will only allow developers to run [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,6],"tags":[],"class_list":["post-122083","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/122083","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=122083"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/122083\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=122083"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=122083"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=122083"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}