如何识别真实的密码请求
How to recognise a genuine password request

原始链接: https://eclecticlight.co/2025/12/18/how-to-recognise-a-genuine-password-request/

## 识别真实的 macOS 密码请求 恶意软件经常以你的密码为目标,因此识别合法的身份验证请求至关重要。macOS 使用由系统生成的统一对话框,而非各个应用程序,来请求访问钥匙串。 主要有三种类型:**传统型(无 Touch ID)**,带有锁定的锁图标和应用程序的符号,以粗体文字显示应用程序和请求的项目名称,并明确说明需要*钥匙串*密码(而非你的 Apple ID)。**垂直型(无 Touch ID)** 显示类似的锁图标、应用程序名称、请求目的以及用户名(预先填写)和密码字段。**Touch ID** 使用指纹图标、应用程序名称,并提示使用 Touch ID 或密码输入;尝试失败后会恢复到密码字段,同时保留指纹图标。 使用 **Terminal (sudo)** 时,请查找一个简单的“Password:”提示,*紧接着*一个独特的密钥图标 – 输入的字符在按下 Return 键之前将保持隐藏。 **务必谨慎:** 如果不确定,请拒绝该请求或查阅应用程序的文档。如果可疑,请在“钥匙串访问”中验证钥匙串访问权限。如果只请求密码,切勿提供用户名。优先仔细审查*每一个*请求,以保护你的 Mac 安全。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 如何识别真实的密码请求 (eclecticlight.co) 7 分,来自 naves 1 小时前 | 隐藏 | 过去 | 收藏 | 1 条评论 fph 6 分钟前 [–] 这篇文章提出一个问题:是否存在支持不可伪造密码请求的操作系统?也就是说,这些请求具有某种颜色、窗口细节或 UI 特征,只能由系统对话框生成,而不能被恶意应用程序模拟。 我想,在应用程序可以全屏并逐像素在屏幕上绘制任何内容的情况下,设计此功能很难。 也许可以像系统要求你在输入密码前按下 ctrl+alt+del,其中 ctrl+alt+del 是一个应用程序无法拦截的按键组合。回复 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请 YC | 联系 搜索:
相关文章

原文

One of the primary aims of most malware is to trick you into giving it your password. Armed with that, there’s little to stop it gathering up your secrets and sending them off to your attacker’s servers. One of your key defences against that is to know when a password request is genuine, and when it’s bogus. By far the best way to authenticate now is using Touch ID, but many Macs don’t support it, either because they can’t, or because their keyboard doesn’t, and there are still occasions when a genuine request may not offer it. This article looks at the anatomy of a range of genuine password requests. Note that these dialogs aren’t generated by the app, but come from the macOS security system, hence their consistency.

Traditional, no Touch ID

keychain

This authentication dialog is very important: although malware might try to forge it, it contains distinctive features you should always look for:

  • The icon consists of a locked padlock, on which is superimposed a miniature icon representing the app or component that has asked to access the keychain.
  • The bold text names the app or component that has called for keychain access, and states which item it’s asking to access: here, a named secure note.
  • The smaller lettering specifies that it’s asking for the keychain password, that is the password used to unlock the named keychain, not that for your Apple Account or any other password.
  • If you’re in any doubt about its authenticity, click on the Deny button and the request will be denied.
  • If you’re in any doubt about its authenticity, open Keychain Access, lock the keychain there, and repeat the action while watching the keychain to ensure that it’s unlocked and handled correctly.

Note this doesn’t provide or ask for your user name, only the password for that keychain.

Vertical, no Touch ID

keychain03

This newer vertical format should contain the following:

  • The icon consists of a locked padlock, on which is superimposed a miniature icon representing the app or component that is asking for your password.
  • Bold text names the app making the request.
  • Below that is a general indication of the purpose of the request.
  • Below that is the instruction to Enter your password to allow this.
  • There are two text boxes, to contain your user name (already completed) and password.
  • There are only two buttons, one of which may be OK or something more specific, and the other is Cancel.

If you’re in any doubt as to its authenticity, click on the Cancel button to deny the request, and consult the app’s documentation.

Here’s a similar version from Sequoia, seen in Dark Mode, with the same key features.

Touch ID

If your Mac supports Touch ID (all Intel Macs with T2 chips, and all Apple silicon Macs), and currently has a keyboard connected to it with support for Touch ID (Intel laptops and Apple silicon Macs only), macOS should offer you the biometric version of that authentication dialog.

passwordeg3

This should contain the following:

  • The icon consists of a Touch ID fingerprint, on which is superimposed a miniature icon representing the app or component that is asking for your password.
  • Bold text names the app making the request.
  • Below that is a general indication of the purpose of the request.
  • Below that is the instruction to Touch ID or enter your password to allow this.
  • There are only two buttons, the upper being Use Password…, and the lower is Cancel.
  • If you’re in any doubt as to its authenticity, click on the Cancel button to deny the request, and consult the app’s documentation.

This dialog has distinctive behaviour that’s difficult to forge. When you place your fingertip on the Touch ID button on the keyboard, it will either authenticate successfully, so dismissing the dialog, or the dialog shakes to indicate you should try placing your fingertip on the button again.

Here’s a more recent version from Tahoe, with the icon and text left-justified.

You will also see the icon with its fingerprint whorls filled in colour.

pwordprompt1

If Touch ID authentication fails, or you click on the button to Use Password…, the dialog expands to resemble the non-biometric version above, with the following two important differences:

  • The icon still consists of a Touch ID fingerprint, with a superimposed miniature icon representing the app or component.
  • The instruction remains to Touch ID or enter your password to allow this.

Terminal

Authenticating in Terminal, typically when using sudo, has less scope for distinctive detail, and might appear simpler to forge. However, macOS has a couple of tricks up its sleeve that are difficult to fake.

This contains the following:

  • The prompt consists of the single word ending with a colon, Password: Other words, such as System password, are fakes.
  • Immediately after the colon is a distinctive icon of a vertical white key on a grey rectangle. The closest you’ll see in standard Unicode is the Squared Key character ⚿ which is obviously different.
  • As you type in your password, not only are the characters not shown, but the same key icon remains where it is, and there’s no indication on screen that you’re typing anything in until you press Return. Fakes usually display characters as you type them in.

Again, if you’re in any doubt, simply press Return and exit without giving any characters of your password away.

Finally, no matter how rushed you might be, or sick to death of repeated authentication requests, check every one carefully before typing anything in, as if your Mac’s security depended on it. Because it does.

联系我们 contact @ memedata.com