SecureMac Issues Critical Security Advisory for MacKeeper Users

LOS ANGELES — Apple Macintosh and Mac OS X security specialists SecureMac, has issued a critical security advisory for users of the OS X utility program MacKeeper.

According to SecureMac, a flaw in MacKeeper’s URL handler implementation allows arbitrary remote code execution when a user visits a specially crafted webpage. MacKeeper was originally created by Ukrainian company ZeoBIT, and is now distributed by Kromtech Alliance Corp.

Security researcher Braden Thomas discovered the flaw, caused by MacKeeper’s lack of input validation when executing commands using its custom URL scheme, enabling commands to be run as “root” with little to no user interaction required.

Thomas published a proof-of-concept (POC) that demonstrates how using Safari to visit a specially coded webpage causes the affected system to execute various commands, which in the case of the POC, will uninstall MacKeeper.

SecureMac notes that while the POC is relatively benign, the source code provided with it could easily be modified to perform malicious attacks.

“If MacKeeper has already prompted the user for their password during the normal course of the program’s operation, the user will not be prompted for their password prior to the arbitrary command being executed as root,” explains a SecureMac spokesperson. “If the user hasn’t previously authenticated, they will be prompted to enter their username and password — however, the text that appears for the authentication dialog can be manipulated as part of the exploit and set to anything, so the user might not realize the consequences of this action.”

As with other operating systems, Apple allows OS X and iOS apps to define custom URL schemes and register them with the operating system so that other programs know which app should handle the custom URL scheme.

“Normally, this is used to define a custom communication protocol for sending data or performing a specific action (for example, clicking a telephone number link in iOS will ask if the user wants to dial that number, or clicking an email address link in OS X will open Mail.app and compose a new message to that person),” the spokesperson adds. “Apple’s inter-application programming guide explicitly tells developers to validate the input received from these custom URLs in order to avoid problems related to URL handling. Additionally, Apple has provided information on the importance of input validation in their Secure Coding Guide.”

It appears that these security guidelines were ignored.

According to MacKeeper, its software has surpassed 20 million downloads worldwide, but despite this popularity, reports from users have cited its numerous pop-ups and advertisements as major negatives, and it remains to be seen how this latest revelation will affect its users.

A workaround is available for MacKeeper users until this vulnerability in the program is fixed: On OS X, clicking a link in Safari that uses a custom URL scheme will automatically open the program that is registered to handle that type of URL. Other browsers, such as Google’s Chrome, will ask the user for permission before opening a link that uses an external protocol. Non-technical users could use a web browser other than Safari, in order to see an alert before a link could cause an arbitrary command to be executed, while more technical users could remove the custom URL scheme handler from MacKeeper’s Info.plist file.

For more information, visit SecureMac.com.

Related:  

Copyright © 2026 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More News

Brazil: New AV Requirements Set to Take Effect March 17

President Luiz Inácio Lula da Silva this week gave final approval to new regulations requiring adult websites to age-verify users located in Brazil starting March 17.

FSC Recommends Platforms Integrate StopNCII.org Tool

In a blog post, Free Speech Coalition (FSC) has recommended that platforms integrate the StopNCII.org tool to prevent the sharing of non-consensual intimate imagery (NCII).

Utah 'Porn Tax' Bill With VPN Provisions Passes State Senate

The Utah state Senate has passed a bill that would impose a 2% tax on the revenues of adult websites doing business in that state, and make sites liable if Utah minors use VPNs to circumvent geolocation.

Fast-Tracked Arizona Bill Includes Consent 'Catch-22' for Adult Sites

A bill advancing rapidly through the Arizona state legislature would impose new requirements for adult content uploaded online, including seemingly contradictory provisions that could effectively make it impossible for adult sites to operate in the state.

VirtualRealPorn Launches WebXR-Enabled Site

VirtualRealPorn has officially launched its new site, built on Web Extended Reality (WebXR) technology.

'MyAsianGFs' Launches Through Paysite.com

MyAsianGFs.com has officially launched through Paysite.com.

Corey Silverstein to Host Webinar on North Carolina Age Verification Thursday

Adult industry attorney Corey D. Silverstein has announced his latest "Legal Impact" webinar, titled "North Carolina AV Law — Content Creation Issues," to livestream Thursday at 4 p.m. (EST).

Ofcom Fines 8579 LLC $1.8 Million for AV Noncompliance

U.K. media regulator Ofcom on Monday imposed a fine of 1.35 million pounds (more than $1.8 million) against adult site operator 8579 LLC for failing to implement age checks as required for compliance with the Online Safety Act.

Pearl Industry Network Launches 'TrustLink' Creator Verification Platform

Trade group Pearl Industry Network (PiN) has launched TrustLink, its free creator verification platform.

FSC Updates Complaint in Tennessee AV Case, AG Motions to Dismiss

The Free Speech Coalition this week filed an amended complaint in its lawsuit challenging the Protect Tennessee Minors Act as unconstitutional, in response to which the Tennessee attorney general motioned for dismissal of the case.

Show More