{"id":74035,"date":"2018-01-09T06:14:46","date_gmt":"2018-01-09T14:14:46","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=74035"},"modified":"2019-08-14T14:09:40","modified_gmt":"2019-08-14T21:09:40","slug":"month-in-review-apple-security-in-december-2017","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/","title":{"rendered":"Month in review: Apple security in December 2017"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-74077\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-security-news-december-2017.jpg\" alt=\"Apple Security News December 2017\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-security-news-december-2017.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-security-news-december-2017-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-security-news-december-2017-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The final month of 2017 has come and gone, and for those of us who love a good security story, December didn&#8217;t leave us disappointed. Read on for details about the top Apple-focused security news of the month.<\/p>\n<h3>&#8220;IOHIDeous&#8221; Mac Zero-Day Dropped New Year&#8217;s Eve<\/h3>\n<p>On New Year&#8217;s Eve, a security researcher going by the name Siguza publicly disclosed the <a href=\"https:\/\/siguza.github.io\/IOHIDeous\/\" target=\"_blank\" rel=\"noopener\">full details<\/a> of a local privilege escalation vulnerability that had allegedly been present in versions of macOS for at least the past 15 years.<\/p>\n<p>In order for an attacker to take advantage of the bug (dubbed &#8220;IOHIDeous&#8221;), they would <a href=\"https:\/\/www.csoonline.com\/article\/3245037\/security\/researcher-drops-15-year-old-macos-zero-day-that-leads-to-full-system-compromise.html\" target=\"_blank\" rel=\"noopener\">reportedly<\/a> either need local access to a victim&#8217;s Mac, or to have previously compromised a victim&#8217;s Mac.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-74038\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/iohideous-logo.png\" alt=\"\" width=\"1416\" height=\"228\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/iohideous-logo.png 1416w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/iohideous-logo-150x24.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/iohideous-logo-300x48.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/iohideous-logo-768x124.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/iohideous-logo-1024x165.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/iohideous-logo-657x106.png 657w\" sizes=\"(max-width: 1416px) 100vw, 1416px\" \/><\/p>\n<p style=\"text-align: center;\">IOHIDeous logo. Image credit: <a href=\"https:\/\/siguza.github.io\/IOHIDeous\/\" target=\"_blank\" rel=\"noopener\">Siguza<\/a><\/p>\n<p>Once the bug has been successfully exploited, an attacker would gain root privileges\u2014full administrative control over the victim&#8217;s Mac.<\/p>\n<p>Although the flaw itself is\u00a0entirely\u00a0different, it&#8217;s similar to last month&#8217;s <a href=\"https:\/\/www.intego.com\/mac-security-blog\/i-am-root-a-retrospective-on-a-severe-mac-vulnerability\/\" target=\"_blank\" rel=\"noopener\">&#8220;I Am Root&#8221; vulnerability<\/a> in the sense that it could allow a local attacker to gain root privileges\u00a0on\u00a0a victim&#8217;s Mac.<\/p>\n<p>Apple will likely release a new version of macOS High Sierra that fixes IOHIDeous within the coming weeks.<\/p>\n<p>It remains to be seen whether\u00a0macOS Sierra or El Capitan will also receive updates. Older versions of macOS (OS X) are not expected to receive any security updates.<\/p>\n<p>In short, if your Mac is capable of running macOS High Sierra (<a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-mac-cant-run-macos-sierra\/\" target=\"_blank\" rel=\"noopener\">here&#8217;s how to find out<\/a>), <strong>now&#8217;s a good time to upgrade<\/strong>.<\/p>\n<h3>Apple Updates Everything (Even AirPort)<\/h3>\n<p>Apple\u00a0released <a href=\"https:\/\/support.apple.com\/en-hk\/HT201222\" target=\"_blank\" rel=\"noopener\">security updates<\/a> for virtually every\u00a0one of its products during the month of December:<\/p>\n<ul>\n<li><strong>macOS High Sierra 10.13.2<\/strong> (along with partial* updates for Sierra and El Capitan)<\/li>\n<li><strong>iOS 11.2<\/strong> (and later <strong>11.2.1<\/strong>)<\/li>\n<li><strong>tvOS 11.2<\/strong> (and later <strong>11.2.1<\/strong>)<\/li>\n<li><strong>watchOS 4.2<\/strong><\/li>\n<li><strong>AirPort Base Station Firmware<\/strong> for supported models<\/li>\n<li><strong>iTunes 12.7.2 for Windows<\/strong><\/li>\n<li><strong>iCloud for Windows 7.2<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-74041\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-92x150.png\" alt=\"\" width=\"61\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-92x150.png 92w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-184x300.png 184w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-768x1254.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-627x1024.png 627w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown-657x1073.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/meltdown.png 2048w\" sizes=\"(max-width: 61px) 100vw, 61px\" \/>*As is often the case, Apple\u00a0chose not to fix all of vulnerabilities in the two previous versions of macOS, Sierra and El Capitan. For example,\u00a0Apple updated their <a href=\"https:\/\/support.apple.com\/en-us\/HT208331\" target=\"_blank\" rel=\"noopener\">support article<\/a>\u00a0in early January to reveal that the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\" target=\"_blank\" rel=\"noopener\">Meltdown vulnerability<\/a> was only patched for macOS High Sierra, not for Sierra or El Capitan.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71809\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Apple-AirPort-Extreme-802.11ac-150x150.png\" alt=\"\" width=\"125\" height=\"125\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Apple-AirPort-Extreme-802.11ac-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Apple-AirPort-Extreme-802.11ac-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Apple-AirPort-Extreme-802.11ac-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Apple-AirPort-Extreme-802.11ac-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Apple-AirPort-Extreme-802.11ac-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Apple-AirPort-Extreme-802.11ac-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Apple-AirPort-Extreme-802.11ac-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Apple-AirPort-Extreme-802.11ac.png 400w\" sizes=\"(max-width: 125px) 100vw, 125px\" \/>The most surprising update was new firmware for <strong>AirPort wireless base stations<\/strong>, which until December 12 had remained vulnerable to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/broadpwn\/\" target=\"_blank\" rel=\"noopener\">Broadpwn<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/\" target=\"_blank\" rel=\"noopener\">KRACK<\/a>, two serious vulnerabilities\u00a0that had been known to the public for months.<\/p>\n<p>See also\u00a0our articles from earlier\u00a0in December for further details on Apple&#8217;s security updates:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"MzsNqWgmP5\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-10-13-2-high-sierra-ios-11-2-and-more-with-security-fixes\/\">Apple Releases macOS 10.13.2 High Sierra, iOS 11.2 and More with Security Fixes<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-10-13-2-high-sierra-ios-11-2-and-more-with-security-fixes\/embed\/#?secret=MzsNqWgmP5\" data-secret=\"MzsNqWgmP5\" width=\"500\" height=\"282\" title=\"&#8220;Apple Releases macOS 10.13.2 High Sierra, iOS 11.2 and More with Security Fixes&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"7lWf1fsuzX\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-ios-11-2-1-tvos-11-2-1-and-more-with-security-fixes\/\">Apple Releases iOS 11.2.1, tvOS 11.2.1 and More with Security Fixes<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-ios-11-2-1-tvos-11-2-1-and-more-with-security-fixes\/embed\/#?secret=7lWf1fsuzX\" data-secret=\"7lWf1fsuzX\" width=\"500\" height=\"282\" title=\"&#8220;Apple Releases iOS 11.2.1, tvOS 11.2.1 and More with Security Fixes&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>OSX.Pirrit Adware\/Malware Still Out There<\/h3>\n<p>On December 12, security researcher Amit Serper published a new\u00a0<a href=\"https:\/\/www.cybereason.com\/blog\/targetingedge-mac-os-x-pirrit-malware-adware-still-active\" target=\"_blank\" rel=\"noopener\">report about\u00a0OSX.Pirrit<\/a>,\u00a0dangerous Mac adware\u00a0that has been around for a couple years and is still out there in the wild.<\/p>\n<p>Serper reports that the latest version of <strong>OSX.Pirrit<\/strong>\u00a0leverages AppleScript, a Mac scripting and automation technology. And, like previous versions of Pirrit, Serper says that the adware\u00a0&#8220;[bombards] people with ads, it\u00a0[spies]\u00a0on them and runs under root privileges;&#8221; it\u00a0has full\u00a0control to\u00a0do whatever it wants with a victim&#8217;s Mac.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/P5m8wsQ5BFw?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>I\u00a0interviewed\u00a0Serper about his research into OSX.Pirrit;\u00a0you won&#8217;t want to miss\u00a0the <a href=\"https:\/\/www.youtube.com\/watch?v=P5m8wsQ5BFw\" target=\"_blank\" rel=\"noopener\">interview YouTube video<\/a>\u00a0in which we discuss\u00a0Serper&#8217;s incredible adventures\u2014including inadvertently discovering the exact\u00a0names of the people who were behind the malware!<\/p>\n<h3>&#8220;I Am Root&#8221; Fixes May Have Left Users Vulnerable<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-73057\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/i-am-root-logo-300x225.jpg\" alt=\"\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/i-am-root-logo-300x225.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/i-am-root-logo-150x113.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/i-am-root-logo.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Last month we had a featured story about the &#8220;I Am Root&#8221; vulnerability, whereby an attacker could enable the powerful root account on a victim&#8217;s Mac due to a programming error in macOS High Sierra. If you missed that story,\u00a0you can\u00a0learn more here:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"mRl6Cxtzqb\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/i-am-root-a-retrospective-on-a-severe-mac-vulnerability\/\">&#8220;I Am Root&#8221;: a retrospective on a severe Mac vulnerability<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/i-am-root-a-retrospective-on-a-severe-mac-vulnerability\/embed\/#?secret=mRl6Cxtzqb\" data-secret=\"mRl6Cxtzqb\" width=\"500\" height=\"282\" title=\"&#8220;&#8220;I Am Root&#8221;: a retrospective on a severe Mac vulnerability&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Even as that article was being written, there were rumors about flaws in the way Apple released its security updates for High Sierra. It turned out that, although Apple had only stated\u00a0that it would patch 10.13.1, Apple had also patched version 10.13\u2014and if a user had gotten the automatic patch on 10.13, under <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/12\/yet-another-flaw-in-apples-iamroot-bug-fix\/\" target=\"_blank\" rel=\"noopener\">certain conditions<\/a> after upgrading to 10.13.1 their Mac might become vulnerable again.<\/p>\n<p>By now, especially since 10.13.2 has subsequently been released, the vast majority of Internet-connected Macs running macOS High Sierra should be protected against the &#8220;I Am Root&#8221; vulnerability.<\/p>\n<p>If you haven&#8217;t yet upgraded your Mac to macOS High Sierra version 10.13.2,\u00a0you&#8217;ll want\u00a0to do so as soon as possible, as it also\u00a0includes a fix for the serious <a href=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\" target=\"_blank\" rel=\"noopener\">Meltdown vulnerability<\/a>.<\/p>\n<h3>Other Security News, in Brief<\/h3>\n<p>There were other notable goings-on in the security world in December. Some highlights:<\/p>\n<ul>\n<li>Four episodes of\u00a0Intego&#8217;s <strong>Mac Security Podcast<\/strong>\u00a0were published in December,\u00a0with\u00a0topics\u00a0including the\u00a0<a href=\"http:\/\/podcast.intego.com\/8\" target=\"_blank\" rel=\"noopener\">I Am Root vulnerability<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-9-this-is-potemkin-security\/\">a rushed iOS update,\u00a0plus iOS backup strategies<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-10-tom-cruise-is-in-every-starbucks\/\" target=\"_blank\" rel=\"noopener\">&#8220;Tom Cruise is in every Starbucks&#8221;<\/a> (safe online shopping, and the AirPort firmware update), and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-11-handcuffs-made-of-tissue-paper\/\" target=\"_blank\" rel=\"noopener\">&#8220;Handcuffs Made of Tissue Paper&#8221;<\/a> (search engine data collection, and differential privacy). <strong>Be sure to <a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribe<\/a><\/strong> to make sure you don&#8217;t miss our\u00a0future episodes, including our discussion of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\" target=\"_blank\" rel=\"noopener\">Meltdown<\/a>!<br \/>\n<a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone size-thumbnail wp-image-73078\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes-150x55.png\" alt=\"Monero\" width=\"109\" height=\"40\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes-150x55.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes-300x110.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes.png 646w\" sizes=\"(max-width: 109px) 100vw, 109px\" \/><\/a><\/li>\n<li><strong>AdThink<\/strong> and <strong>OnAudience<\/strong>\u00a0advertisements may have <a href=\"https:\/\/www.theverge.com\/2017\/12\/30\/16829804\/browser-password-manager-adthink-princeton-research\" target=\"_blank\" rel=\"noopener\">pulled data from your browser&#8217;s password manager<\/a><\/li>\n<li>A <strong>RootsWeb<\/strong>\u00a0server exposed 300,000\u00a0<strong>Ancestry.com<\/strong> users&#8217; data, including <a href=\"https:\/\/blogs.ancestry.com\/ancestry\/2017\/12\/23\/rootsweb-security-update\/\" target=\"_blank\" rel=\"noopener\">e-mail addresses and passwords<\/a><\/li>\n<li><strong>Mozilla Firefox<\/strong>\u00a0collected crash data from users who hadn&#8217;t opted in; Mozilla\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/software\/mozilla-will-delete-firefox-crash-reports-collected-by-accident\/\" target=\"_blank\" rel=\"noopener\">will\u00a0delete collected data<\/a>\u00a0just in case<\/li>\n<li><strong>ai.type<\/strong>, a popular third-party mobile keyboard,\u00a0<a href=\"https:\/\/9to5google.com\/2017\/12\/05\/ai-type-data-leak\/\">leaked personal data of over 31 million users<\/a>\u00a0\u2014 &#8220;While the app is available for both iOS and Android, the leaked data seems to relate only to Android users,&#8221; according to 9to5Google<\/li>\n<li>A\u00a0<strong>Google Android<\/strong>\u00a0flaw lets hackers <a href=\"https:\/\/thehackernews.com\/2017\/12\/android-malware-signature.html\" target=\"_blank\" rel=\"noopener\">inject malware into apps without altering signatures<\/a><\/li>\n<li><strong>Samsung&#8217;s<\/strong> Android browser had a critical <a href=\"https:\/\/thehackernews.com\/2017\/12\/same-origin-policy-bypass.html\" target=\"_blank\" rel=\"noopener\">&#8220;same origin policy&#8221; bypass flaw<\/a><\/li>\n<li><strong>Microsoft<\/strong> issued an emergency Windows update for a <a href=\"https:\/\/thehackernews.com\/2017\/12\/windows-update-malware-protection.html\" target=\"_blank\" rel=\"noopener\">critical vulnerability in its Malware Protection Engine<\/a><\/li>\n<li><strong>Windows 10<\/strong>&#8216;s preinstalled password manager <strong>Keeper<\/strong> had a flaw that\u00a0<a href=\"https:\/\/thehackernews.com\/2017\/12\/windows-10-password-manager.html\" target=\"_blank\" rel=\"noopener\">allowed\u00a0hackers to steal\u00a0passwords<\/a><\/li>\n<li><strong>HP<\/strong> notebooks&#8217; keyboard driver discovered to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/hardware\/keylogger-found-in-hp-notebook-keyboard-driver\/\" target=\"_blank\" rel=\"noopener\">include a keystroke logger<\/a><\/li>\n<li><strong>Huawei<\/strong> routers were <a href=\"http:\/\/www.securityweek.com\/mirai-variant-satori-targets-huawei-routers\" target=\"_blank\" rel=\"noopener\">compromised by &#8220;Satoshi,&#8221;<\/a> a Mirai botnet variant; the\u00a0code used in\u00a0the zero-day\u00a0attack was later <a href=\"http:\/\/www.securityweek.com\/botnets-huawei-router-exploit-code-now-public\" target=\"_blank\" rel=\"noopener\">made public<\/a><\/li>\n<li><strong>AMAG Technologies<\/strong> keyless entry door locks had flaws that could\u00a0<a href=\"https:\/\/www.scmagazine.com\/vulnerabilities-found-in-amag-technology-symmetry-ip-based-access-door-controllers\/article\/713740\/\" target=\"_blank\" rel=\"noopener\">give attackers control<\/a><\/li>\n<li><strong>Fox-IT<\/strong>\u00a0(a major security firm that has investigated several high-profile breaches) revealed that <a href=\"https:\/\/www.grahamcluley.com\/fox-it-dns-hack\/\" target=\"_blank\" rel=\"noopener\">hackers hijacked its DNS records\u00a0and spied on clients&#8217; files<\/a> back in September<\/li>\n<\/ul>\n<h3>Stay Tuned! Subscribe to The Mac Security Blog<\/h3>\n<p>Be sure to subscribe to <strong>The Mac Security Blog<\/strong> to stay informed about Apple security throughout each month.<\/p>\n<p>If you missed\u00a0our previous Apple security news roundups for 2017, you can check them out\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/month-in-security\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>Also,\u00a0be sure to\u00a0<a href=\"https:\/\/www.youtube.com\/subscription_center?add_user=IntegoVideo\" target=\"_blank\" rel=\"noopener\">subscribe<\/a>\u00a0to our YouTube channel to get monthly updates in video form, and click on\u00a0YouTube&#8217;s bell\u00a0icon (?) so you&#8217;ll get notified when each new episode is available!<br \/>\n<span style=\"font-size: x-small;\">&#8220;I am root&#8221;\/Groot cartoon image credit:\u00a0<a href=\"https:\/\/dribbble.com\/shots\/3441716-I-Am-Groot\" target=\"_blank\" rel=\"noopener\">Johnathon Burns<\/a>\u00a0modified by\u00a0<a href=\"https:\/\/twitter.com\/Nainterceptor\/status\/935816285811826688\" target=\"_blank\" rel=\"noopener\">Ga\u00ebl\u200f<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The final month of 2017 has come and gone, and for those of us who love a good security story, December didn&#8217;t leave us disappointed. Read on for details about the top Apple-focused security news of the month. &#8220;IOHIDeous&#8221; Mac Zero-Day Dropped New Year&#8217;s Eve On New Year&#8217;s Eve, a security researcher going by the [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":74080,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3586,3802,3859,3694,3853,3988,3250],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The final month of 2017 has come and gone, and for those of us who love a good security story, December didn&#039;t leave us disappointed. Read on for details\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Month in review: Apple security in December 2017 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The final month of 2017 has come and gone, and for those of us who love a good security story, December didn&#039;t leave us disappointed. Read on for details\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-09T14:14:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-14T21:09:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-month-in-security-dec2017.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-month-in-security-dec2017.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-month-in-security-dec2017.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple Month in Security Dec 2017\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/\",\"name\":\"Month in review: Apple security in December 2017 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#primaryimage\"},\"datePublished\":\"2018-01-09T14:14:46+00:00\",\"dateModified\":\"2019-08-14T21:09:40+00:00\",\"description\":\"The final month of 2017 has come and gone, and for those of us who love a good security story, December didn't leave us disappointed. Read on for details\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Month in review: Apple security in December 2017\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Month in review: Apple security in December 2017\",\"datePublished\":\"2018-01-09T14:14:46+00:00\",\"dateModified\":\"2019-08-14T21:09:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#webpage\"},\"wordCount\":1136,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-month-in-security-dec2017.jpg\",\"keywords\":[\"Broadpwn\",\"IAmRoot\",\"IOHIDeous\",\"KRACK\",\"Meltdown\",\"Monero\",\"Month in Security\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The final month of 2017 has come and gone, and for those of us who love a good security story, December didn't leave us disappointed. Read on for details","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/","og_locale":"en_US","og_type":"article","og_title":"Month in review: Apple security in December 2017 - The Mac Security Blog","og_description":"The final month of 2017 has come and gone, and for those of us who love a good security story, December didn't leave us disappointed. Read on for details","og_url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-01-09T14:14:46+00:00","article_modified_time":"2019-08-14T21:09:40+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-month-in-security-dec2017.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-month-in-security-dec2017.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-month-in-security-dec2017.jpg","width":400,"height":260,"caption":"Apple Month in Security Dec 2017"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/","name":"Month in review: Apple security in December 2017 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#primaryimage"},"datePublished":"2018-01-09T14:14:46+00:00","dateModified":"2019-08-14T21:09:40+00:00","description":"The final month of 2017 has come and gone, and for those of us who love a good security story, December didn't leave us disappointed. Read on for details","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Month in review: Apple security in December 2017"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Month in review: Apple security in December 2017","datePublished":"2018-01-09T14:14:46+00:00","dateModified":"2019-08-14T21:09:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#webpage"},"wordCount":1136,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-month-in-security-dec2017.jpg","keywords":["Broadpwn","IAmRoot","IOHIDeous","KRACK","Meltdown","Monero","Month in Security"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-december-2017\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/apple-month-in-security-dec2017.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jg7","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74035"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=74035"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74035\/revisions"}],"predecessor-version":[{"id":88246,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/74035\/revisions\/88246"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/74080"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=74035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=74035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=74035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}