“At the Virus Bulletin security conference in Montreal on Wednesday, Mac security researcher Thomas Reed is presenting one such potentially dangerous opening,” Newman writes. “When you launch an app installer in macOS, a program called Gatekeeper checks to see whether the app originated from the Mac App Store, or is cryptographically signed by a developer who has registered with Apple. All legitimate programs have to be ‘code signed’ to establish their validity and integrity. By checking a file’s code signature, Gatekeeper can warn you if a program is malware or if someone has tampered with an otherwise benign installer.”
“These code signature checks are a vital security step. But Reed, who is the director of Mac and mobile platforms at the security firm Malwarebytes, has noticed that once a program passes a code signature check and gets installed, macOS never rechecks its signature,” Newman writes. “This means that attackers who buy a legitimate certificate from Apple—or steal one—can potentially trick Mac users into installing their malware. And if it manages to infect other legitimate programs after being downloaded, it could evade detection indefinitely.”
Read more in the full article here.
MacDailyNews Take: To date, Newman reports that Reed hasn’t seen any malware that capitalizes on this, so hopefully, now that they know about it, Apple can close this hole before anything untoward happens.