'iLeakage' Flaw Can Prompt Apple's Safari to Expose Passwords, Sensitive Data (2024)

Security researchers have discovered a vulnerability in Apple products that can be abused to force the Safari browser to leak a user’s login credentials and other sensitive data to a hacker.

On Wednesday, a team of researchers—which includes Daniel Genkin, a cybersecurity professor at Georgia Tech—published a paper and website warning users about the threat.The vulnerability, dubbed “iLeakage,” affects Macs and iPhones from 2020 and onwards that were built with the company’s Arm-based A-series and M-series chips.

The flaw builds off an existing attack technique that’s been used on CPUs for the past six years. Back in 2018, security researchers disclosed that all modern CPUs can be manipulated to leak sensitive information by exploiting an integral feature on the processors called “speculative execution.”

Through speculative execution, a chip can essentially prefetch instructions, cutting down on load times. However, the same feature can pre-fetch sensitive data, which can be leaked through “side channels” on a PC, like the state of the memory cache, giving hackers a way to peek at the normally protected information.

Although the tech industry has developed various ways to lessen the threat, Genkin and his team discovered that speculative execution attacks can also affect Apple’s Arm-based chips. The threat allowed them to create a proof-of-concept attack using a malicious website that can essentially siphon protected information from the Safari browser.

'iLeakage' Flaw Can Prompt Apple's Safari to Expose Passwords, Sensitive Data (1)

(Credit: iLeakage paper)

The attack works partly by harnessing the JavaScript window.open API. Researchers noticed the function can bring the victim’s website data into the same address space of their malicious website, giving them a way to read any leaked sensitive information from a targeted Mac or iPhone.

"Thus, we created an attacker page that binds window.open to an onmouseover event listener, allowing us to open any web page in our address space whenever the target has their mouse cursor on the page," the team's research paper says. "We note that even if the target closes the opened page, the contents in memory are not scrubbed immediately, allowing our attack to continue disclosing secrets."

In three video demos, the team showed the attack works if a user visits the malicious website. The page can then be triggered to open a new window to whatever website the hackers wants to siphon secrets from, like a Gmail inbox or a YouTube watch history. In one video, the malicious site opens a window for the Instagram login page. The attack then proceeds to steal the username and password autofilled with the user’s Safari browser.

The researchers warn the flaw also affects all browsers on iOS since Apple requires third-party browsers to use its WebKit engine on the operating system. Fortunately, the technique requires a high level of technical knowledge to pull off, which is perhaps the main reason whyspeculative execution attacks have never caught on in the cybercriminal community.

Recommended by Our Editors

How to Protect Your Apple ID With Security Keys

No More Passwords: How to Set Up Apple's Passkeys for Easy Sign-ins

Apple's Safety Check: How to Lock Down Your iPhone From Abusive Partners

Ars Technica also notes a malicious website leveraging the iLeakage flaw needs “about five minutes to profile the target machine and, on average, roughly another 30 seconds to extract a 512-bit secret, such as a 64-character string.”

The researchers notified Apple about the flaw over a year ago, in September 2022. But since then, the company has only developed a “mitigation” that has to be manually turned to protect the user, the team says. In addition, the mitigation—which isolates that threat via the window.open Javascript function—only applies to Macs.

However, Apple is indicating a more permanent fix is on the way. The company told PCMag it plans on addressing the threat in its next scheduled software release. For instructions on activating the mitigation, you can visit the iLeakage page.

"When Apple pushes the mitigation to production, we expect it to completely protect users from our attack," added Jason Kim, a PhD student at Georgia Tech, who worked on the team. "We have not heard from Apple on how their mitigation affects their browser performance benchmarks, or when the mitigations will be deployed to customers."

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

About Michael Kan

Senior Reporter

I've been working as a journalist for over 15 years—I got my start as a schools and cities reporter in Kansas City and joined PCMag in 2017.

Read Michael's full bio

Read the latest from Michael Kan

  • 23andMe Agrees To $30 Million Settlement For Last Year's Data Breach
  • This CAPTCHA Test Can Trick Windows Users Into Installing Malware
  • Polaris Dawn Mission Uses Starlink for Star Wars Performance In Space
  • $100 More? SpaceX's Starlink Adds 'Congestion Charge' For Certain Areas
  • FDA Clears Apple's Hearing Aid Tech For AirPods Pro 2
  • More from Michael Kan
'iLeakage' Flaw Can Prompt Apple's Safari to Expose Passwords, Sensitive Data (2024)
Top Articles
Can ChatGPT Code Be Detected? - Arvin
NFT to BTC Converter — 1 APENFT to Bitcoin price calculator, convert cryptocurrency online on 3commas.io
Jonathon Kinchen Net Worth
Practical Magic 123Movies
Best Cheap Action Camera
What is international trade and explain its types?
Urinevlekken verwijderen: De meest effectieve methoden - Puurlv
Dusk
Learn2Serve Tabc Answers
Buff Cookie Only Fans
Extra Virgin Coconut Oil Walmart
I Saysopensesame
We Discovered the Best Snow Cone Makers for Carnival-Worthy Desserts
eHerkenning (eID) | KPN Zakelijk
Samantha Aufderheide
zom 100 mangadex - WebNovel
Vegito Clothes Xenoverse 2
Babbychula
Thick Ebony Trans
Lines Ac And Rs Can Best Be Described As
Troy Gamefarm Prices
Impact-Messung für bessere Ergebnisse « impact investing magazin
Roanoke Skipthegames Com
Wood Chipper Rental Menards
Geico Car Insurance Review 2024
Housing Intranet Unt
Desales Field Hockey Schedule
Ancestors The Humankind Odyssey Wikia
Swimgs Yuzzle Wuzzle Yups Wits Sadie Plant Tune 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Autumns Cow Dog Pig Tim Cook’s Birthday Buff Work It Out Wombats Pineview Playtime Chronicles Day Of The Dead The Alpha Baa Baa Twinkle
Helloid Worthington Login
Unity Webgl Player Drift Hunters
October 31St Weather
Restored Republic December 9 2022
Soulstone Survivors Igg
Tugboat Information
Verizon Outage Cuyahoga Falls Ohio
Author's Purpose And Viewpoint In The Dark Game Part 3
11 Best Hotels in Cologne (Köln), Germany in 2024 - My Germany Vacation
Myrtle Beach Craigs List
Vintage Stock Edmond Ok
Quick Base Dcps
Uc Davis Tech Management Minor
Wgu Admissions Login
Ehc Workspace Login
Value Village Silver Spring Photos
Stoughton Commuter Rail Schedule
Rheumatoid Arthritis Statpearls
Rise Meadville Reviews
Pulpo Yonke Houston Tx
Dumb Money Showtimes Near Regal Stonecrest At Piper Glen
Latest Posts
Article information

Author: Lilliana Bartoletti

Last Updated:

Views: 6524

Rating: 4.2 / 5 (73 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Lilliana Bartoletti

Birthday: 1999-11-18

Address: 58866 Tricia Spurs, North Melvinberg, HI 91346-3774

Phone: +50616620367928

Job: Real-Estate Liaison

Hobby: Graffiti, Astronomy, Handball, Magic, Origami, Fashion, Foreign language learning

Introduction: My name is Lilliana Bartoletti, I am a adventurous, pleasant, shiny, beautiful, handsome, zealous, tasty person who loves writing and wants to share my knowledge and understanding with you.