<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Thumbnail — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/thumbnail/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/thumbnail/feed.xml" rel="self" type="application/rss+xml"/><item><title>macOS QuickLook Thumbnail Cache Leak</title><link>https://feed.craftedsignal.io/briefs/2024-01-quicklook-cache-leak/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-quicklook-cache-leak/</guid><description>macOS QuickLook caches thumbnails and file paths of files, even those stored within encrypted containers or on removable USB devices, potentially revealing sensitive data to attackers with access to the running system.</description><content:encoded><![CDATA[<p>The macOS QuickLook feature, designed for quickly previewing file contents, caches thumbnails and file paths of files, including those stored within encrypted containers (e.g., VeraCrypt, macOS Encrypted HFS+/APFS drives) and removable USB devices. This cached information is stored in the clear within the user&rsquo;s temporary directory ($TMPDIR/../C/com.apple.QuickLook.thumbnailcache/) and persists across reboots. This behavior, while known in forensics circles, is not widely understood by Mac users and can lead to unintended data leakage. The file paths, names, and thumbnail previews are accessible to any code running in the context of the user, even after the encrypted container is unmounted or the USB device is removed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User mounts an encrypted container (e.g., VeraCrypt, APFS) or inserts a USB drive into a macOS system.</li>
<li>User views a directory containing files within the mounted container or USB drive using Finder, or previews a file using the space bar, triggering QuickLook.</li>
<li>QuickLook generates thumbnails and caches file paths and names in the <code>$TMPDIR/../C/com.apple.QuickLook.thumbnailcache/</code> directory.</li>
<li>The <code>index.sqlite</code> file stores the file paths and names, while <code>thumbnails.data</code> stores the thumbnail images.</li>
<li>User unmounts the encrypted container or removes the USB drive.</li>
<li>The cached thumbnails and file paths remain in the <code>$TMPDIR/../C/com.apple.QuickLook.thumbnailcache/</code> directory.</li>
<li>An attacker gains access to the user&rsquo;s macOS system.</li>
<li>The attacker extracts the cached thumbnails and file paths from the QuickLook cache directory, potentially revealing sensitive information about the contents of the encrypted container or USB drive.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker with access to a macOS system to recover thumbnails and file paths of files that were stored in encrypted containers or on removable USB devices. This can lead to the disclosure of sensitive information, even if the encrypted containers are unmounted or the USB drives are removed. The impact is significant for users who rely on encryption to protect sensitive data, as the QuickLook cache undermines the security provided by encrypted containers. The size of the thumbnails, even the smaller automatically generated ones, may be sufficient to discern the content of the files.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Regularly clear the QuickLook cache, particularly after unmounting encrypted containers. Since <code>qlmanage -r</code> doesn&rsquo;t reliably clear the cache, consider deleting the entire <code>com.apple.QuickLook.thumbnailcache</code> directory.</li>
<li>Implement endpoint detection rules to detect unauthorized access or modification of the QuickLook cache directory (<code>$TMPDIR/../C/com.apple.QuickLook.thumbnailcache/</code>) using the &ldquo;Detect Suspicious QuickLook Cache Access&rdquo; Sigma rule.</li>
<li>Monitor process execution for attempts to access or manipulate the QuickLook cache files (<code>index.sqlite</code>, <code>thumbnails.data</code>) using the &ldquo;Detect QuickLook Cache File Access&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>quicklook</category><category>cache</category><category>macos</category><category>thumbnail</category><category>privacy</category></item></channel></rss>