With the dust still not settled after the FaceTime privacy bug, news about another macOS vulnerability is already making headlines in top-tier media. It's called macOS keychain exploit, and if you're a Mac user hearing about it for the first time, do yourself a favor and read this article attentively.
MacOS keychain exploit: what happened?
As it turns out, Keychain—macOS app designed to securely store passwords and other user credentials—is not as secure as Apple wants us to believe. A German security researcher, Linuz Henze, revealed via Twitter, anyone can steal your passwords using an app called KeySteal.
To take advantage of this macOS keychain vulnerability, a password hacker would first need to install this malicious app (KeySteal) on the victim's Mac. Of course, such a situation isn't likely to happen (unless you have a few password hackers hanging out around your Mac every now and then). However, this case demonstrates how little it takes to break into "the most secure password storage" ever.
What is KeySteal?
KeySteal is a malicious app designed to extract user passwords and other credentials stored in macOS Keychain without administrator privileges.
KeySteal was written by an 18-year-old security expert from Germany. It looks like his intention was to show the world how insecure their privacy really is and, most importantly, to convince Apple of the necessity of offering a bug bounty program for macOS.
KeySteal effectively does its job on all versions of macOS, including the recently updated macOS Mojave.
How did Apple respond to the macOS keychain vulnerability news?
As we know now, Apple did contact Linus Henze regarding the vulnerability he found. They asked him to provide details about his exploit, and he agreed to do so if they would publicly explain why they do not run a bug bounty program for macOS (like they do for iOS).
Apple did not respond. At least at the time of writing this article.
While it's a good sign Apple reached out in the first place, it looks suspicious that they refused to meet such a simple request—especially, given that the data privacy of their entire user base is at stake.
Furthermore, the Apple website is sending mixed signals about the severity of the issue. The top ranking search result for “Apple Keychain breach” outright contradicts the the following 2 results.
What should you do as a regular Mac user?
If you're worried about falling victim to this troublesome bug, there are 2 simple steps you can take to protect your privacy.
Change your default Keychain password to a unique (and strong) one.
Remember that downloading apps from suspicious, unofficial sources can put your online security and privacy at risk.
The closing word on KeySteal and macOS keychain exploit
If there is something valuable to learn from this story, let this be it: calling something completely secure is not enough. This worrisome bug should serve as another good lesson to Apple. We wish Linuz Henzethe the best of luck convincing Apple to run a bug bounty program. Obviously, it wouldn’t hurt.
The above is the detailed content of What Is KeySteal? macOS Keychain Exploit Explained. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

If you've owned multiple Apple devices over the years, you might find yourself in a situation where some of those older Macs, iPhones, iPads, or other Apple hardware have been sold, given away, or traded. No matter how they left your possession, it's

When typing on a Mac using a Windows keyboard, the Win key corresponds to the Command key and the Alt key corresponds to the Option key; 1. Understand the key mapping: The Win key replaces the Command key for commonly used shortcut keys such as Command C/V, the Alt key replaces the Option key for special symbol input, and the right Alt key may be mapped to Control or other functions; 2. Adjust the keyboard mapping can be customized through system settings or third-party tool Karabiner-Elements; 3. In terms of function keys and multimedia key support, the F key needs to be used with the Fn key, the default brightness and volume function can be adjusted, and some brand shortcut keys are incompatible and need to be customized; 4. Common shortcut key comparison includes copy and paste.

The default mail application of Mac can be changed to Outlook, Spark and other clients. The specific steps are as follows: 1. Open "System Settings" or "System Preferences" and enter the "Default Application" section; 2. Select the target mailbox application in the "Email" column; 3. If the target application is not displayed, check whether it supports mail protocol binding, try to restart the application or update the version; 4. Test whether the change is effective, click the web email link to confirm whether the pop-up application is the target client. Complete the above steps to successfully switch the default mailbox.

To reopen closed tabs on Mac, launch Safari and navigate to the History menu. Then select either Reopen Last Closed Tab, Reopen Last Closed Window, or click on Recently Closed to restore all tabs from your previous browsing session.Common reasons to

For Mac users who are also sports enthusiasts, there’s a handy little free application known as MenuScores. This app displays the game of your choice directly in the menu bar, making it easy to monitor scores or upcoming game times with just a glance

Some Mac users have noticed that their Contacts app occasionally loses all contact information, leaving the entire address book empty. While this situation is definitely concerning, there's a bright side — in most cases, it’s an easy fix, and your co

To share your Mac screen with others, you can choose the appropriate method according to different scenarios. First, through video conferencing tools such as Zoom, click the "Share" button to select the screen or a specific window for sharing; second, use Messages or FaceTime to initiate a screen sharing session, click the " " to select "Screen Sharing" and invite the other party to view or control it; third, use the "Screen Sharing" App that comes with the system to enable this function on the target Mac and connect to the server address through Finder to achieve remote access; in addition, you need to pay attention to details such as permission settings, privacy protection and network performance impact.

How to transfer files from Mac to external hard driveWhen moving files, you physically remove them from their original location. Copying files, meanwhile, preserves the original file location—pasting a second version to
