<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Privacy — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/privacy/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 26 Jan 2024 18:10:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/privacy/feed.xml" rel="self" type="application/rss+xml"/><item><title>macOS Mojave Sandbox Distributed Notification Bypass</title><link>https://feed.craftedsignal.io/briefs/2024-01-macos-sandbox-leak/</link><pubDate>Fri, 26 Jan 2024 18:10:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-macos-sandbox-leak/</guid><description>A vulnerability in macOS Mojave allows sandboxed applications to bypass sandbox restrictions and surreptitiously monitor user activities by registering for distributed notifications by name, circumventing intended privacy protections.</description><content:encoded><![CDATA[<p>A vulnerability exists in macOS Mojave that allows sandboxed applications to bypass intended restrictions on distributed notifications. Apple&rsquo;s macOS sandbox aims to prevent malicious applications from spying on users. However, a flaw exists where sandboxed applications can register to receive distributed notifications by name, such as &ldquo;com.apple.DownloadFileFinished&rdquo;, effectively circumventing the intended restrictions. This vulnerability, disclosed in November 2018, allows a sandboxed application to monitor user activities, such as file downloads, which would normally be prohibited. This affects fully patched macOS Mojave systems and likely other versions of macOS.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious application is created and sandboxed on macOS.</li>
<li>The application registers to receive specific distributed notifications by name (e.g., <code>com.apple.DownloadFileFinished</code>) using <code>CFNotificationCenterAddObserver</code> or <code>NSDistributedNotificationCenter</code>.</li>
<li>The sandboxed application monitors system events by receiving distributed notifications.</li>
<li>The application captures user activities, such as file downloads, screen lock/unlock events, screen saver start/stop, and bluetooth activity.</li>
<li>Collected information is stored within the application&rsquo;s sandbox.</li>
<li>The application may then exfiltrate the collected data.</li>
<li>The attacker gains unauthorized access to user activity data, violating user privacy.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows sandboxed applications to bypass intended privacy protections and monitor user activities, such as file downloads and system events. This can lead to unauthorized access to sensitive information and a violation of user privacy. While the exact number of victims is unknown, this vulnerability affects any user running a vulnerable version of macOS with a sandboxed application exploiting this flaw.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for sandboxed applications using <code>CFNotificationCenterAddObserver</code> or <code>NSDistributedNotificationCenter</code> registering for distributed notifications by name (e.g., <code>com.apple.DownloadFileFinished</code>). Deploy the Sigma rule <code>Detect Sandboxed Application Registering for Distributed Notifications by Name</code> to your SIEM.</li>
<li>Investigate any sandboxed applications that are observed to be receiving distributed notifications using the event names listed in the overview.</li>
<li>Consider monitoring network connections made by sandboxed applications to detect potential data exfiltration attempts after gathering notification data.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>sandbox-escape</category><category>privacy</category><category>macos</category></item><item><title>macOS QuickLook Thumbnail Cache Leak</title><link>https://feed.craftedsignal.io/briefs/2024-01-quicklook-cache-leak/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-quicklook-cache-leak/</guid><description>macOS QuickLook caches thumbnails and file paths of files, even those stored within encrypted containers or on removable USB devices, potentially revealing sensitive data to attackers with access to the running system.</description><content:encoded><![CDATA[<p>The macOS QuickLook feature, designed for quickly previewing file contents, caches thumbnails and file paths of files, including those stored within encrypted containers (e.g., VeraCrypt, macOS Encrypted HFS+/APFS drives) and removable USB devices. This cached information is stored in the clear within the user&rsquo;s temporary directory ($TMPDIR/../C/com.apple.QuickLook.thumbnailcache/) and persists across reboots. This behavior, while known in forensics circles, is not widely understood by Mac users and can lead to unintended data leakage. The file paths, names, and thumbnail previews are accessible to any code running in the context of the user, even after the encrypted container is unmounted or the USB device is removed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User mounts an encrypted container (e.g., VeraCrypt, APFS) or inserts a USB drive into a macOS system.</li>
<li>User views a directory containing files within the mounted container or USB drive using Finder, or previews a file using the space bar, triggering QuickLook.</li>
<li>QuickLook generates thumbnails and caches file paths and names in the <code>$TMPDIR/../C/com.apple.QuickLook.thumbnailcache/</code> directory.</li>
<li>The <code>index.sqlite</code> file stores the file paths and names, while <code>thumbnails.data</code> stores the thumbnail images.</li>
<li>User unmounts the encrypted container or removes the USB drive.</li>
<li>The cached thumbnails and file paths remain in the <code>$TMPDIR/../C/com.apple.QuickLook.thumbnailcache/</code> directory.</li>
<li>An attacker gains access to the user&rsquo;s macOS system.</li>
<li>The attacker extracts the cached thumbnails and file paths from the QuickLook cache directory, potentially revealing sensitive information about the contents of the encrypted container or USB drive.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker with access to a macOS system to recover thumbnails and file paths of files that were stored in encrypted containers or on removable USB devices. This can lead to the disclosure of sensitive information, even if the encrypted containers are unmounted or the USB drives are removed. The impact is significant for users who rely on encryption to protect sensitive data, as the QuickLook cache undermines the security provided by encrypted containers. The size of the thumbnails, even the smaller automatically generated ones, may be sufficient to discern the content of the files.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Regularly clear the QuickLook cache, particularly after unmounting encrypted containers. Since <code>qlmanage -r</code> doesn&rsquo;t reliably clear the cache, consider deleting the entire <code>com.apple.QuickLook.thumbnailcache</code> directory.</li>
<li>Implement endpoint detection rules to detect unauthorized access or modification of the QuickLook cache directory (<code>$TMPDIR/../C/com.apple.QuickLook.thumbnailcache/</code>) using the &ldquo;Detect Suspicious QuickLook Cache Access&rdquo; Sigma rule.</li>
<li>Monitor process execution for attempts to access or manipulate the QuickLook cache files (<code>index.sqlite</code>, <code>thumbnails.data</code>) using the &ldquo;Detect QuickLook Cache File Access&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>quicklook</category><category>cache</category><category>macos</category><category>thumbnail</category><category>privacy</category></item><item><title>Signal 'Disappearing' Messages Persist in macOS Notification Center</title><link>https://feed.craftedsignal.io/briefs/2024-01-signal-notification-leak/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-signal-notification-leak/</guid><description>macOS stores Signal message notifications in an unencrypted SQLite database, potentially exposing 'disappearing' messages even after they are deleted from the Signal application.</description><content:encoded><![CDATA[<p>A vulnerability exists in the macOS implementation of the Signal messaging application, where &lsquo;disappearing&rsquo; messages may persist in the macOS Notification Center database even after being deleted from the Signal application&rsquo;s user interface. This occurs because Signal posts message content to the Notification Center as a banner notification when the app is not in the foreground. While the OS automatically dismisses these banners, the underlying notification data, including message content, remains stored in an unencrypted SQLite database. This issue affects users of Signal on macOS who rely on the disappearing message feature for privacy. The vulnerability was publicly disclosed in May 2018 by Objective-See.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a message in the Signal application on macOS.</li>
<li>If the Signal application is not in the foreground, the message content is displayed as a banner notification via the macOS Notification Center.</li>
<li>The macOS operating system automatically dismisses the banner notification after a few seconds.</li>
<li>The notification data, including the message content, is stored in an SQLite database located at <code>/private/var/folders/l8/.../com.apple.notificationcenter/db2/db</code>.</li>
<li>The user deletes the message from within the Signal application, triggering its removal from the application&rsquo;s UI.</li>
<li>The Signal application does not explicitly remove the corresponding notification from the macOS Notification Center database.</li>
<li>An attacker with local access to the macOS system can access the unencrypted SQLite database.</li>
<li>The attacker can extract and read the contents of the &lsquo;disappearing&rsquo; messages from the database, bypassing Signal&rsquo;s intended privacy feature.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker with local access to a macOS system to recover and read &lsquo;disappearing&rsquo; messages from the Signal application, even after they have been deleted within the application. This compromises the confidentiality of sensitive communications intended to be ephemeral, potentially impacting a large number of Signal users on macOS.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation logging to monitor processes accessing the SQLite database <code>/private/var/folders/l8/.../com.apple.notificationcenter/db2/db</code> using the provided Sigma rule.</li>
<li>Disable notifications within the Signal application to prevent message content from being stored in the Notification Center database.</li>
<li>Consider implementing disk encryption to protect the entire file system, including the Notification Center database.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>macos</category><category>signal</category><category>notification</category><category>privacy</category><category>credential-access</category></item></channel></rss>