Bugs that let sites hijack Mac and iPhone cameras fetch $75k bounty

Here’s how one researcher bypassed stringent restrictions Apple puts on webcam access. …

Bugs that let sites hijack Mac and iPhone cameras fetch $75k bounty

Ryan Pickren

reader comments

36 with 32 posters participating, including story author

A security bug that gave malicious hackers the ability to access the cameras of Macs, iPhones, and iPads has fetched a $75,000 bounty to the researcher who discovered it.

In posts published here and here, researcher Ryan Pickren said he discovered seven vulnerabilities in Safari and its Webkit browser engine that, when chained together, allowed malicious websites to turn on the cameras of Macs, iPhones, and iPads. Pickren privately reported the bugs, and Apple has since fixed the vulnerabilities and paid the researcher $75,000 as part of the company’s bug bounty program.

Apple tightly restricts the access that third-party apps get to device cameras. For Apple apps, the restrictions aren’t quite as stringent. Even then, Safari requires users to explicitly list the sites that are allowed camera access. And beyond that, cameras can only have access to those sites when they are delivered in a secure context, meaning when the browser has high confidence the page is being delivered through an HTTPS connection.

When Skype.com isn’t Skype.com

Pickren devised an exploit chain that bypassed these protections. By exploiting multiple vulnerabilities he discovered, the researcher was able to force Safari to treat his malicious proof-of-concept website as if it was Skype.com, which for demonstration purposes was included in the list of trusted sites. (Skype.com doesn’t actually support Safari, but Pickren’s exploit can spoof any site, including Zoom and Google Hangouts, that does.) The video below shows the result.

The hack in desktop format.