Star 0

Abstract

Thursday 6 October 14:30 - 15:00, Red roomPatrick Wardle (Synack)One of the most insidious actions of malware is abusing the video capabilities of an infected host to record an unknowing user. Macs, of course, are not immune; malware such as OSX/Eleanor, OSX/Crisis, and others, all attempt to spy on OS X users.Luckily, modern Macs contain a hardware-based LED indicator that can alert users when the camera is in use. And physically covering the built-in camera also provides a low-tech, albeit highly effective solution.Still, Mac users often legitimately make use of their built-in webcams. For example, a CEO joining in on an important business meeting, a journalist Skyping with a private source, or the everyday Mac user having an intimate FaceTime session with their partner. Unfortunately, malware can covertly record these, all in an essentially undetectable manner.After examining various ‘webcam-aware’ OS X malware samples, the research will show a new ‘attack’ that would allow such malware to stealthily monitor the system for legitimate user-initiated video sessions, then surreptitious piggyback into this in order to covertly record the session. As there are no visible indications of this malicious activity (as the LED light is already on), the malware can record both audio and video without fear of detection. In order to combat this, we'll discuss techniques that aim to detect 'secondary' processes that attempt to access an existing video session on OS X. Moreover, a (free) tool will be released that implements such detection mechanisms in order to alert users of this treacherous attack. Click here for more details about the conference.

Papers

Videos