SecureMac Issues Critical Security Advisory for MacKeeper Users

LOS ANGELES — Apple Macintosh and Mac OS X security specialists SecureMac, has issued a critical security advisory for users of the OS X utility program MacKeeper.

According to SecureMac, a flaw in MacKeeper’s URL handler implementation allows arbitrary remote code execution when a user visits a specially crafted webpage. MacKeeper was originally created by Ukrainian company ZeoBIT, and is now distributed by Kromtech Alliance Corp.

Security researcher Braden Thomas discovered the flaw, caused by MacKeeper’s lack of input validation when executing commands using its custom URL scheme, enabling commands to be run as “root” with little to no user interaction required.

Thomas published a proof-of-concept (POC) that demonstrates how using Safari to visit a specially coded webpage causes the affected system to execute various commands, which in the case of the POC, will uninstall MacKeeper.

SecureMac notes that while the POC is relatively benign, the source code provided with it could easily be modified to perform malicious attacks.

“If MacKeeper has already prompted the user for their password during the normal course of the program’s operation, the user will not be prompted for their password prior to the arbitrary command being executed as root,” explains a SecureMac spokesperson. “If the user hasn’t previously authenticated, they will be prompted to enter their username and password — however, the text that appears for the authentication dialog can be manipulated as part of the exploit and set to anything, so the user might not realize the consequences of this action.”

As with other operating systems, Apple allows OS X and iOS apps to define custom URL schemes and register them with the operating system so that other programs know which app should handle the custom URL scheme.

“Normally, this is used to define a custom communication protocol for sending data or performing a specific action (for example, clicking a telephone number link in iOS will ask if the user wants to dial that number, or clicking an email address link in OS X will open Mail.app and compose a new message to that person),” the spokesperson adds. “Apple’s inter-application programming guide explicitly tells developers to validate the input received from these custom URLs in order to avoid problems related to URL handling. Additionally, Apple has provided information on the importance of input validation in their Secure Coding Guide.”

It appears that these security guidelines were ignored.

According to MacKeeper, its software has surpassed 20 million downloads worldwide, but despite this popularity, reports from users have cited its numerous pop-ups and advertisements as major negatives, and it remains to be seen how this latest revelation will affect its users.

A workaround is available for MacKeeper users until this vulnerability in the program is fixed: On OS X, clicking a link in Safari that uses a custom URL scheme will automatically open the program that is registered to handle that type of URL. Other browsers, such as Google’s Chrome, will ask the user for permission before opening a link that uses an external protocol. Non-technical users could use a web browser other than Safari, in order to see an alert before a link could cause an arbitrary command to be executed, while more technical users could remove the custom URL scheme handler from MacKeeper’s Info.plist file.

For more information, visit SecureMac.com.

Related:  

Copyright © 2026 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More News

BranditScan Rolls Out 2 New Platform Features

BranditScan has introduced its new Traffic Optimization and Doxing Protection features for creators.

NMG Management Partners With Cosplayground to Scale Distribution

NMG Management has partnered with Cosplayground to expand the studio’s digital distribution and licensing operations.

Dreamcam Rolls Out 'Voice Translator AI'

Dreamcam has introduced a Voice Translator AI to its livestreaming platform.

UK Government May Limit 'Step' Porn Ban With New Amendments

The U.K. Ministry of Justice on Friday revealed new government amendments to the pending Crime and Policing Bill, potentially limiting a planned ban on “step” content to apply only if adult performers role-play as minors.

Arizona Senate Removes 'Catch-22' Provision From Consent Bill

The Arizona State Senate has amended a bill that would impose new requirements for adult content uploaded online, removing a seemingly contradictory provision that could have effectively made it impossible for adult sites to operate in the state.

Climaxx Media Launches Networking Platform

Climaxx Media has officially launched its new networking platform.

Italian Court in Aylo Case Limits International Reach of AV Rules

An Italian administrative court has ruled that Italy’s recently-enacted age verification rules for adult content may not currently be enforced against sites based in other EU member states, pending further procedural action under the EU’s Directive on Electronic Commerce.

OCC, FDIC Prohibit Use of 'Reputation Risk' by Regulators

The Office of the Comptroller of the Currency (OCC) and the Federal Deposit Insurance Corporation (FDIC) on Tuesday issued a final rule codifying the elimination of ‘reputation risk’ as a criterion in their supervision of financial institutions.

Wisconsin Governor Vetoes Age Verification Bill

Gov. Tony Evers on Friday vetoed AB 105, an age verification bill that would have allowed anyone to sue adult content providers for damages over alleged failure to age-verify users in Wisconsin, with penalties of up to $10,000 per violation.

FSC Releases Statement on Wisconsin Governor Vetoing AV Bill

The Free Speech Coalition has released a statement on Wisconsin Governor Tony Evers' veto of the state's age verification legislation.

Show More