{"id":99153,"date":"2023-10-27T13:56:42","date_gmt":"2023-10-27T20:56:42","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=99153"},"modified":"2023-10-31T14:34:20","modified_gmt":"2023-10-31T21:34:20","slug":"ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/","title":{"rendered":"iLeakage Attack could let hackers steal passwords, data from Safari on Macs"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-99149\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/10\/iLeakage-Attack-Spectre-speculative-execution-Apple-silicon-M-series-Macs-600x300-1.jpg\" alt=\"\" width=\"800\" height=\"400\" \/><\/p>\n<p>Remember <a href=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\">Spectre<\/a>, the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/speculative-execution\/\">speculative execution<\/a> attack? Researchers have discovered a new exploitation technique called the &#8220;iLeakage Attack&#8221; that can exploit processors&#8217; speculative execution feature. Specifically, an attacker may be able to steal passwords and extract data from pages in the Safari browser on Apple silicon (M-series processor) Macs. Meanwhile, iPhones and iPads (with A-series processors) are also vulnerable.<\/p>\n<p>In a paper titled &#8220;iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices&#8221; (<a href=\"https:\/\/ileakage.com\/files\/ileakage.pdf\" target=\"_blank\" rel=\"noopener\">PDF<\/a>), four university researchers describe the attack. They demonstrate how an attacker can recover passwords that were autofilled by a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\">credential manager<\/a>, or the contents of Web pages (for example, a victim&#8217;s private Gmail messages or YouTube watch history), using their iLeakage exploit.<\/p>\n<p>Here are the most important things to know about the iLeakage Attack.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#real\">Has iLeakage been used in real-world attacks?<\/a><\/li>\n<li><a href=\"#miti\">Are there any mitigation techniques?<\/a>\n<ul>\n<li><a href=\"#miti1\">Mitigation technique 1: Enable &#8220;Swap Processes on Cross-Site Window Open&#8221;<\/a><\/li>\n<li><a href=\"#miti2\">Mitigation technique 2: Enable Lockdown Mode<\/a><\/li>\n<li><a href=\"#miti3\">Mitigation technique 3: Use a browser other than Safari<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#hist\">What&#8217;s the history of speculative execution exploits?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"real\"><\/a><\/li>\n<\/ul>\n<h3>Has iLeakage been used in real-world attacks?<\/h3>\n<p>The researchers are unaware of any real-world attacks that may have leveraged the iLeakage exploitation methodology. But that doesn&#8217;t mean it hasn&#8217;t happened.<\/p>\n<p>It is highly unlikely that anyone\u2014aside from a threat actor that may have used the technique\u2014would ever know that the exploit had been used. No system logs would indicate the usage of such exploits.<a name=\"miti\"><\/a><\/p>\n<h3>Are there any mitigation techniques?<\/h3>\n<p>If you&#8217;re concerned about someone potentially using the iLeakage Attack against you, there are a few options for protecting your system.<a name=\"miti1\"><\/a><\/p>\n<h4><strong>Mitigation technique 1: Enable &#8220;Swap Processes on Cross-Site Window Open&#8221;<\/strong><\/h4>\n<p>The iLeakage homepage explains that Apple implemented a (non-default) mitigation for this exploit in macOS Ventura 13.0. This means that all later versions of macOS\u2014including macOS Sonoma 14.x\u2014have the capability to enable Apple&#8217;s mitigation method.\u00a0<strong>The caveat: Apple chose to leave the mitigation disabled by default<\/strong>, meaning that concerned users or IT administrators will have to manually enable the mitigation technique.<\/p>\n<p>Users of macOS Sonoma can follow this process to enable the mitigation:<\/p>\n<ol>\n<li>Temporarily enable Full Disk Access for the Terminal app.<\/li>\n<li>Open the Terminal, and copy and paste the following command, then press the Return or Enter key on the keyboard:<br \/>\n<code>defaults write com.apple.Safari IncludeInternalDebugMenu 1<\/code><\/li>\n<li>Open Safari, click on the Debug menu, hover over &#8220;WebKit Internal Features,&#8221; and scroll down to &#8220;Swap Processes on Cross-Site Window Open.&#8221; If that menu item doesn&#8217;t have a \u221a checkmark next to it, then the mitigation is not currently enabled; click on the menu item to enable it.<\/li>\n<li>Disable Full Disk Access for the Terminal app.<\/li>\n<\/ol>\n<p>More complete steps on how to enable Full Disk Access, as well as the slightly different mitigation method for macOS Ventura, are available on <a href=\"https:\/\/ileakage.com\/\" target=\"_blank\" rel=\"noopener\">the iLeakage site<\/a>.<a name=\"miti2\"><\/a><\/p>\n<h4><strong>Mitigation technique 2: Enable Lockdown Mode<\/strong><\/h4>\n<p>An alternative way to block the iLeakage exploitation technique is to enable <a href=\"https:\/\/support.apple.com\/en-us\/HT212650\" target=\"_blank\" rel=\"noopener\">Lockdown Mode<\/a>. However, Lockdown Mode has other side effects that average users may find undesirable, as it&#8217;s specifically designed to reduce the device&#8217;s feature set to limit its attack surface. Apple intends for Lockdown Mode to be used by people who are highly likely to be targeted by well-funded, nation-state level threat actors.<a name=\"miti3\"><\/a><\/p>\n<h4><strong>Mitigation technique 3: Use a browser other than Safari<\/strong><\/h4>\n<p>Only Safari is vulnerable to the specific exploitation technique developed by the researchers. Thus, using <a href=\"https:\/\/www.intego.com\/mac-security-blog\/safari-chrome-firefox-which-is-the-most-private-browser-for-mac\/\">Firefox, Chrome, or another Chromium-based browser<\/a> would be sufficient to stop the iLeakage Attack.<a name=\"hist\"><\/a><\/p>\n<h3>What&#8217;s the history of speculative execution exploits?<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-74014\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-150x84.png\" alt=\"\" width=\"150\" height=\"84\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-150x84.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-300x167.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-768x428.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-1024x570.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre-657x366.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/Meltdown-Spectre.png 1492w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>In January 2018, multiple groups published independently researched reports about vulnerabilities related to <em>speculative execution<\/em>, a technology that enhances processor performance. Also revealed at that time were <a href=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\">Meltdown and Spectre<\/a>\u2014exploits that leveraged those vulnerabilities.<\/p>\n<p>While Intel got a bad rap for the existence of these vulnerabilities, the problem wasn&#8217;t actually limited to only Intel (or even AMD) CPUs. ARM-based processors, like those in Apple&#8217;s iPhone, iPad, and iPod touch products, also required software-based mitigations. Apple released some relevant security patches for these systems, as well as for Macs, in December 2017 (before the vulnerabilities were disclosed to the public) and January 2018.<\/p>\n<p>Later speculative execution exploits have included <a href=\"https:\/\/en.wikipedia.org\/wiki\/Foreshadow\" target=\"_blank\" rel=\"noopener\">Foreshadow<\/a> (August 2018), <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-spoiler-attack-puts-intel-processors-at-risk\/\">SPOILER<\/a> (March 2019), <a href=\"https:\/\/www.intego.com\/mac-security-blog\/epic-disasters-zombieload-whatsapp-google-2fa-keys-microsoft-rdp-intego-mac-podcast-episode-83\/\">ZombieLoad<\/a> (May 2019), <a href=\"https:\/\/www.intego.com\/mac-security-blog\/lockdown-mode-intego-mac-podcast-episode-248\/\">Retbleed<\/a> (July 2022), and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/\">Downfall<\/a> (August 2023), all of which affected Intel processors. Yet another, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pacman_(security_vulnerability)\" target=\"_blank\" rel=\"noopener\">PACMAN<\/a> (June 2022), affected Apple M1 processors specifically.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-large wp-image-74029\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-1024x987.png\" alt=\"xkcd #1938: Meltdown and Spectre\" width=\"512\" height=\"494\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-1024x987.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-150x145.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-300x289.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-768x740.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-657x633.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/01\/xkcd-1938_meltdown_and_spectre_2x.png 1147w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><br \/>\nImage credit: <a href=\"https:\/\/www.xkcd.com\/1938\/\" target=\"_blank\" rel=\"noopener\">xkcd #1938<\/a> by Randall Munroe<\/p>\n<p>Apple began to migrate Macs to its own ARM-based &#8220;M-series&#8221; (M1, M2, and M3) processors, collectively dubbed &#8220;Apple silicon,&#8221; in 2020. Other than refurbished units, Apple no longer sells Intel-based Macs today. However, Apple still supports many Intel Macs; macOS Sonoma is compatible with many Intel-based Mac models released between 2017 and 2020.<\/p>\n<p>Of course, as we have seen with PACMAN and now iLeakage, even Apple silicon Macs are not invulnerable to speculative execution attacks. It is likely that more such attack methods will be discovered in the future.<a name=\"learnmore\"><\/a><\/p>\n<h3 id=\"exploremore\">How can I learn more?<\/h3>\n<p>More details about the iLeakage Attack, including demonstration videos, are available at the researchers&#8217; site: <a href=\"https:\/\/ileakage.com\/\" target=\"_blank\" rel=\"noopener\">ileakage.com<\/a>.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers have revealed iLeakage, a Spectre-based exploit that lets attackers steal passwords and sensitive data from the Safari browser on Macs. Here is everything you need to know to stay protected.<\/p>\n","protected":false},"author":14,"featured_media":99150,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[52,3856,4712,143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Researchers have revealed iLeakage, a Spectre-based exploit that lets attackers steal passwords and sensitive data from the Safari browser on Macs. Here is everything you need to know to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iLeakage Attack could let hackers steal passwords, data from Safari on Macs - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Researchers have revealed iLeakage, a Spectre-based exploit that lets attackers steal passwords and sensitive data from the Safari browser on Macs. Here is everything you need to know to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-27T20:56:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-31T21:34:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/10\/iLeakage-Attack-Spectre-speculative-execution-Apple-silicon-M-series-Macs-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/10\/iLeakage-Attack-Spectre-speculative-execution-Apple-silicon-M-series-Macs-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/10\/iLeakage-Attack-Spectre-speculative-execution-Apple-silicon-M-series-Macs-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"iLeakage Attack: Spectre speculative execution Apple silicon M-series Macs\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/\",\"name\":\"iLeakage Attack could let hackers steal passwords, data from Safari on Macs - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#primaryimage\"},\"datePublished\":\"2023-10-27T20:56:42+00:00\",\"dateModified\":\"2023-10-31T21:34:20+00:00\",\"description\":\"Researchers have revealed iLeakage, a Spectre-based exploit that lets attackers steal passwords and sensitive data from the Safari browser on Macs. Here is everything you need to know to stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iLeakage Attack could let hackers steal passwords, data from Safari on Macs\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"iLeakage Attack could let hackers steal passwords, data from Safari on Macs\",\"datePublished\":\"2023-10-27T20:56:42+00:00\",\"dateModified\":\"2023-10-31T21:34:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#webpage\"},\"wordCount\":920,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/10\/iLeakage-Attack-Spectre-speculative-execution-Apple-silicon-M-series-Macs-400x260-1.jpg\",\"keywords\":[\"Exploit\",\"Spectre\",\"Speculative Execution\",\"Vulnerabilities\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Researchers have revealed iLeakage, a Spectre-based exploit that lets attackers steal passwords and sensitive data from the Safari browser on Macs. Here is everything you need to know to stay protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/","og_locale":"en_US","og_type":"article","og_title":"iLeakage Attack could let hackers steal passwords, data from Safari on Macs - The Mac Security Blog","og_description":"Researchers have revealed iLeakage, a Spectre-based exploit that lets attackers steal passwords and sensitive data from the Safari browser on Macs. Here is everything you need to know to stay protected.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-10-27T20:56:42+00:00","article_modified_time":"2023-10-31T21:34:20+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/10\/iLeakage-Attack-Spectre-speculative-execution-Apple-silicon-M-series-Macs-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/10\/iLeakage-Attack-Spectre-speculative-execution-Apple-silicon-M-series-Macs-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/10\/iLeakage-Attack-Spectre-speculative-execution-Apple-silicon-M-series-Macs-400x260-1.jpg","width":400,"height":260,"caption":"iLeakage Attack: Spectre speculative execution Apple silicon M-series Macs"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/","name":"iLeakage Attack could let hackers steal passwords, data from Safari on Macs - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#primaryimage"},"datePublished":"2023-10-27T20:56:42+00:00","dateModified":"2023-10-31T21:34:20+00:00","description":"Researchers have revealed iLeakage, a Spectre-based exploit that lets attackers steal passwords and sensitive data from the Safari browser on Macs. Here is everything you need to know to stay protected.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"iLeakage Attack could let hackers steal passwords, data from Safari on Macs"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"iLeakage Attack could let hackers steal passwords, data from Safari on Macs","datePublished":"2023-10-27T20:56:42+00:00","dateModified":"2023-10-31T21:34:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#webpage"},"wordCount":920,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/10\/iLeakage-Attack-Spectre-speculative-execution-Apple-silicon-M-series-Macs-400x260-1.jpg","keywords":["Exploit","Spectre","Speculative Execution","Vulnerabilities"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/ileakage-attack-could-let-hackers-steal-passwords-data-from-safari-on-macs\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/10\/iLeakage-Attack-Spectre-speculative-execution-Apple-silicon-M-series-Macs-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pNf","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99153"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=99153"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99153\/revisions"}],"predecessor-version":[{"id":99179,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/99153\/revisions\/99179"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/99150"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=99153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=99153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=99153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}