Bypassing macOS Security With Synthetic Clicks

Security researcher Patrick Wardle found he can bypass macOS security by using synthetic clicks built with AppleScript.

Typically apps are signed with a digital certificate to prove that the app is genuine and hasn’t been tampered with. If the app has been modified to include malware, the certificate usually flags an error and the operating system won’t run the app. But a bug in Apple’s code meant that that macOS was only checking if a certificate exists and wasn’t properly verifying the authenticity of the whitelisted app.

Mr. Wardle refers to this as a “second stage” attack, because the hacker or malware needs access to your Mac to exploit this bug.

Check It Out: Bypassing macOS Security With Synthetic Clicks

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.