Security researchers from Cisco Talos have discovered several vulnerabilities in Microsoft applications for Apple’s macOS operating system. Their operation allows surveillance of Mac computer users, including gaining access to the camera and microphone of the attacked device.

Image source: Copilot

In the Cisco Talos publication, researchers delved deeper into how attackers can exploit vulnerabilities in Microsoft macOS apps, such as Outlook or Teams, to gain access to a device’s camera or microphone without the user’s consent. The attack is based on the introduction of malicious libraries into Microsoft applications in order to obtain rights and permissions similar to those that the user has already granted to legitimate products.

MacOS has a service called Transparency Consent and Control (TCC), which is used to manage app permissions, including device location, camera, microphone, photos, and more. Every app needs to obtain TCC permission to grant permissions. However, an exploit based on Microsoft application vulnerabilities allows malware to use permissions that were already granted to the software giant’s software products.

«”We have identified eight vulnerabilities in various Microsoft applications for macOS that allow attackers to bypass the operating system’s permissions mechanism by using existing permissions without requiring additional verification from the user,” the researchers said in a statement.

For example, a hacker could create malware to record audio from a microphone or take photos without any interaction from the user of the device. It is noted that all problematic applications, except Excel, have the ability to record sound, and some have access to the camera.

According to available data, Microsoft is already working on a patch that will eliminate the vulnerabilities found in its products for macOS. The issue has already been fixed in Teams and OneNote, but it continues to affect Excel, PowerPoint, Word, and Outlook. The exploit created by the researchers was not considered dangerous by the company because it relies on loading unsigned libraries to support third-party plugins. You can find more detailed information on this issue on the Cisco Talos blog.

admin

Share
Published by
admin

Recent Posts

Threads gets ‘long overdue improvements’ to search and trends

Meta✴ Platforms, the owner of the social network Threads, announced “long overdue improvements” for its…

9 minutes ago

Ubisoft spoke about the capabilities and innovations of stealth mechanics in Assassin’s Creed Shadows – new gameplay

Image source: Ubisoft Let us remind you that the events of Assassin’s Creed Shadows will…

58 minutes ago

Assembly of the second NASA SLS rocket has started – in a year it will send people on a flight around the Moon

NASA announced that assembly of the second lunar rocket, SLS (Space Launch System), has begun…

58 minutes ago

The creators of Black Myth: Wukong will surprise players before the end of the year – teaser from the head of Game Science

Co-founder and CEO of the Chinese studio Game Science, Feng Ji, hinted that some surprises…

3 hours ago

Nvidia stock is no longer the best performer – MicroStrategy soars 500% in a year thanks to Bitcoin

Last Wednesday, trading volume in MicroStrategy shares exceeded that of Nvidia and Tesla. The company,…

3 hours ago

Tired of waiting: sales of S.T.A.L.K.E.R. 2: Heart of Chornobyl exceeded one million copies within two days of release

The post-apocalyptic open-world shooter S.T.A.L.K.E.R. 2: Heart of Chornobyl from the developers from the GSC…

4 hours ago