Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Google’s “Santa” Tracks Naughty and Nice Binaries on Mac OS X

Google’s Macintosh Operations Team announced the availability of the source code for “Santa,” a tool designed for whitelisting and blacklisting binaries on Apple’s Mac OS X operating systems.

Google’s Macintosh Operations Team announced the availability of the source code for “Santa,” a tool designed for whitelisting and blacklisting binaries on Apple’s Mac OS X operating systems.

Threats designed to target devices running Mac OS X are increasingly common and increasingly successful. A perfect example is the recently-uncovered WireLurker malware which is believed to have infected hundreds of thousands of devices in China.

Santa, named so because it “keeps track of binaries that are naughty and nice,” is just one of the many tools and scripts developed by Google’s Macintosh Operations Team for managing and tracking a fleet of Mac computers in a corporate environment. The search engine company uses tens of thousands of Macs and managing them is not an easy task.

Santa is not an official Google product and it’s not even at version 1.0 due to some issues that still need to be addressed, but the project looks promising. The tool has four main components: a kernel extension for monitoring executions, a userland daemon that makes execution decisions based on the contents of a SQLite database, a graphical user interface (GUI) agent that notifies the user when an execution is blocked, and a command-line utility that’s used to manage the system and synchronize the database with a server.

The tool is designed to run in two modes: monitor and lockdown. In the “monitor” mode, all binaries are allowed to run, except for those that are blacklisted. In “lockdown” mode, only whitelisted binaries can be executed.

Users are given the possibility to blacklist or whitelist binaries based on the signing certificate, which allows them to block or trust all binaries from a certain publisher. Because whitelisted binaries are cached in the kernel, processing required to make a request is only carried out if the binary isn’t cached already, Santa developers said.

As a safety feature, the daemon, the GUI agent and the command-line utility check to ensure that their signing certificates are identical before accepting any communications.

Because logging events is important in an enterprise environment, Santa is designed to log all executions processed by the userland agent. In addition, unknown and denied binaries are stored in the database.

Advertisement. Scroll to continue reading.

According to the project’s developers, there is still a lot of work to be done and several issues to address, including kernel extension (kext) communication security, protection for the SQLite database, and completing the code for the management server synchronization.  Furthermore, the developers say no documentation has been written and not enough tests have been conducted.

Santa has been released as open source and the project’s developers say they welcome contributions from anyone. However, those who want to make changes to the tool are required to sign a contributor license agreement.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Karl Triebes has joined Ivanti as Chief Product Officer.

Steven Hernandez has joined USAID as CISO and Deputy CIO.

Data security and privacy firm Protegrity has named Michael Howard as its CEO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.