Older Mac webcams can spy without activating warning light
Researchers from Johns Hopkins University created an application that can disable the LED on first-generation iSight cameras while in use
IDG News Service - Most webcams have a warning light that indicates when they're active, but it's possible for malware to disable this important privacy feature on older Mac computers, according to research from Johns Hopkins University (JHU) in Baltimore.
JHU Assistant Research Professor Stephen Checkoway and graduate student Matthew Brocker investigated the hardware design of the first-generation iSight webcam model installed in Apple's iMac and MacBook computers released before 2008 and found that its firmware could easily be modified to disable the indicator LED.
At the hardware level, the LED is directly attached to the webcam's image sensor, particularly its STANDBY pin. When the STANDBY signal is active the LED is off and when not active, the LED is on, the JHU researchers said in a recently released paper.
In order to disable the LED, the researchers had to find a way to activate STANDBY, but also configure the image sensor to ignore it because when STANDBY becomes active the image sensor output automatically gets disabled, so the webcam cannot be used to capture images.
To achieve this the researchers created a modified version of the iSight firmware and then reprogrammed the camera with it, using a method that involves sending vendor-specic USB device requests from the host OS. They found that this operation doesn't require root privileges and can be done from a process started by a regular user account.
The JHU researchers created a proof-of-concept application called iSeeYou that detects whether an iSight webcam is installed, reprograms it with the modified firmware and then allows the user to start the camera and disable the LED. When the iSeeYou application is stopped, the camera is reprogrammed with the original, unaltered firmware.
In addition to spying on users without them knowing, the ability to easily reprogram the iSight camera could also allow malware to escape from an operating system that runs inside a virtual machine, the researchers said.
To demonstrate, this they reprogrammed the camera from a guest OS running inside VirtualBox -- a virtual machine program -- to act as an Apple USB keyboard. This allowed them to send key presses that transferred the keyboard's ownership from the guest OS to the host OS and then executed shell commands on the host OS.
The JHU researchers didn't only document the iSight weakness, but also proposed defenses, both at the software and hardware levels, against attacks that might try to exploit it. They built a Mac OS X kernel extension called iSightDefender that blocks specific USB device requests that could be used to load rogue firmware from being sent to the camera.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Malware and Vulnerabilities White Papers | Webcasts