Security Experts:

Connect with us

Hi, what are you looking for?


Endpoint Security

Google’s “Santa” Tracks Naughty and Nice Binaries on Mac OS X

Google’s Macintosh Operations Team announced the availability of the source code for “Santa,” a tool designed for whitelisting and blacklisting binaries on Apple’s Mac OS X operating systems.

Google’s Macintosh Operations Team announced the availability of the source code for “Santa,” a tool designed for whitelisting and blacklisting binaries on Apple’s Mac OS X operating systems.

Threats designed to target devices running Mac OS X are increasingly common and increasingly successful. A perfect example is the recently-uncovered WireLurker malware which is believed to have infected hundreds of thousands of devices in China.

Santa, named so because it “keeps track of binaries that are naughty and nice,” is just one of the many tools and scripts developed by Google’s Macintosh Operations Team for managing and tracking a fleet of Mac computers in a corporate environment. The search engine company uses tens of thousands of Macs and managing them is not an easy task.

Santa is not an official Google product and it’s not even at version 1.0 due to some issues that still need to be addressed, but the project looks promising. The tool has four main components: a kernel extension for monitoring executions, a userland daemon that makes execution decisions based on the contents of a SQLite database, a graphical user interface (GUI) agent that notifies the user when an execution is blocked, and a command-line utility that’s used to manage the system and synchronize the database with a server.

The tool is designed to run in two modes: monitor and lockdown. In the “monitor” mode, all binaries are allowed to run, except for those that are blacklisted. In “lockdown” mode, only whitelisted binaries can be executed.

Users are given the possibility to blacklist or whitelist binaries based on the signing certificate, which allows them to block or trust all binaries from a certain publisher. Because whitelisted binaries are cached in the kernel, processing required to make a request is only carried out if the binary isn’t cached already, Santa developers said.

As a safety feature, the daemon, the GUI agent and the command-line utility check to ensure that their signing certificates are identical before accepting any communications.

Because logging events is important in an enterprise environment, Santa is designed to log all executions processed by the userland agent. In addition, unknown and denied binaries are stored in the database.

According to the project’s developers, there is still a lot of work to be done and several issues to address, including kernel extension (kext) communication security, protection for the SQLite database, and completing the code for the management server synchronization.  Furthermore, the developers say no documentation has been written and not enough tests have been conducted.

Santa has been released as open source and the project’s developers say they welcome contributions from anyone. However, those who want to make changes to the tool are required to sign a contributor license agreement.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.


Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Malware & Threats

Security researchers are warning of a new wave of malicious NPM and PyPI packages designed to steal user information and download additional payloads.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.