Jump to content
exile360

iTunes says 'Bonjour' to Ransomware as attackers exploit Zero-Day

Recommended Posts

UPDATE:  New details have come to light indicating that it was the Apple Software Update component affected by this vulnerability NOT Bonjour.  Please refer to the information in this article for details.

A recently patched 0-day in the cloud component of iTunes known as 'Bonjour' was compromised by attackers to deploy ransomware to unsuspecting victims running the Apple software on Windows devices.  Apparently the vulnerability was the result of a very minor mistake in the code for the service where the programmer failed to use quotes to enclose the path for a pointer to a file which allowed the bad guys to manipulate the software to have it launch malicious code, bypassing detection by many AVs since iTunes is a generally trusted digitally signed application.

Thankfully the vulnerability has been patched, but this in my opinion highlights the need for users to be more cautious about the software that they let onto their devices and allow to run in the background constantly and on system startup (both of which Bonjour does by default, because apparently Apple thinks that you have nothing better to do with your system besides hosting iTunes and downloading music).  Sadly such is par for the course these days as marketers at companies vie for engagement with their user base in an attempt to boost sales through increased user interaction, even if that interaction is forced by not giving them an option as to whether or not the software they are installing will run constantly in the background and do things like add a new icon to their notification area, display alerts and marketing messages (which is adware, at least in my opinion), and regardless of how slow it might render a user's device and delay their boot times (one of the chief complaints by many when purchasing an off-the-shelf pre-built system thanks to all of the helpful 'value-add' applications that often come bundled 'for free' with such systems out of the box and which has become known throughout the tech community as 'preinstalled bloatware' and 'crapware' which should give you a sense of how highly these practices are regarded; and for the record, Malwarebytes classifies many of these as PUPs, and ADWCleaner has recently been augmented to specifically target many of these useless preinstalled applications deliberately in order to return control and performance of users' systems to where they belong: in the hands of the users themselves).

Anyway, you can read more about the iTunes 0-day incident here, and you can find Malwarebytes ADWCleaner (which is completely portable and doesn't install anything on your machine ;)here.

Oh, and just for the record, I never have and never will use iTunes, and whenever I see the Bonjour service on a system I'm working on, I generally recommend that the user disables it with Autoruns if they don't absolutely need its cloud/streaming functionality because it's a waste of resources, like most of the 'helpful' applications that run in the background on our systems after installing software that we only use on occasion for a specific purpose.  Apple aren't the only ones doing this, so I don't want anyone to think I'm only picking on them.  Many companies do this and it's shameful.  Computers are faster and more powerful than they have ever been, yet many of them perform about as well as the earliest devices released with Windows Vista (which was actually a decent OS in my opinion; the hardware and drivers just weren't ready for it when it came out) which is inexcusable in my opinion.  It makes me glad that vendors like Malwarebytes exist to provide useful tools to eliminate some of this unwanted rubbish from our devices, especially for those among us who aren't versed in how to use more advanced utilities like Autoruns to eliminate them manually and don't know what is safe to uninstall and what is not.

Edited by exile360

Share this post


Link to post
Share on other sites

Sorry if this needs to be in another topic but a drawing software I use, uses bonjour, am I safe? I haven't turned the computer on since the exploit and I don't have iTunes. 

Share this post


Link to post
Share on other sites

It's possible that it is vulnerable if it uses the same version of Bonjour that ships with iTunes.  I'd suggest checking the developer's website for your drawing software to see if they have any patches/updates available for it.

Share this post


Link to post
Share on other sites

Will do! I never see it running in the task manager however. Hopefully it isn't the same version that comes with iTunes 

Share this post


Link to post
Share on other sites

You can check services.msc to see if it is listed there and see if it is running or not.  That's likely the easiest way to determine if it is installed and if it is active.

Share this post


Link to post
Share on other sites

Will do! If it is vulnerable is there somehow any precautions I should take? I'm hoping Windows Defender will detect it since I don't have premium malwarebytes as of now. 

Share this post


Link to post
Share on other sites

I have no idea, but installing the latest Malwarebytes Anti-Ransomware Beta and Malwarebytes Anti-Exploit Beta would probably be a good idea, just keep in mind that installing Malwarebytes Anti-Ransomware Beta will remove Malwarebytes free from your system because the two programs use different versions of the same components so both cannot be installed at the same time.  Malwarebytes Premium includes Anti-Ransomware and Anti-Exploit in addition to its other components so that's also an option if you do decide to upgrade.

Share this post


Link to post
Share on other sites

I luckily have anti exploit installed on my system, thanks for informing me with this all:)

Share this post


Link to post
Share on other sites

So far I can't find a Common Vulnerability and Exposures listing in Apple Bonjour for what's been purported.

Edited by David H. Lipman

Share this post


Link to post
Share on other sites

I found more details in this article and Apple themselves reference the vulnerability which was reported to Apple by Morphisec Labs in their acknowledgements for their software updates herehere, and here.

It doesn't appear to have a CV# at the moment, but that's likely due to the fact that it was reported more recently and has already been addressed in a patch.  I don't know what the procedure is in situations like this, but I'm guessing they either will issue a CV later or they'll just put it to rest as it was fixed so quickly (though I don't know what the impact is on third party solutions that use Bonjour as mentioned above, so it may still warrant further tracking and documentation).

Share this post


Link to post
Share on other sites

Oh damn, I don't have iTunes at the moment, but good information to have.

That's scary!  I would always disable or uninstall it when it was on my computer or a computer that I was using; I always thought it was pointless and why was it running all the time -_-

Share this post


Link to post
Share on other sites

https://blog.morphisec.com/apple-zero-day-exploited-in-bitpaymer-campaign

Quote

10/11/19 Update: During revalidation of the exploit, and as we continue to work with Apple on further vulnerabilities that have yet to be patched or announced, we observed that the abused vulnerability relates specifically to an Apple Software Update component that is not associated with Bonjour

 

Share this post


Link to post
Share on other sites

Cool, thanks for the update Ron :) 

I've updated my initial post accordingly.

Edited by exile360

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.