Aiden
Ramirez

Plugging the security gap in your Macs with Accessory security

Aiden Ramirez

Jan 25, 2023

8 min read

A man in a black hoodie enters the bank. He approaches the front desk and starts talking to the staff member.

Staff member : Can I help you?

Hacker (man in the black hoodie) : Yeah, I just need to check my account balance real quick.

Staff member : Sure, just let me know if you need help.

The staff member turns to their computer, and the hacker takes advantage of the moment and quickly plugs the USB drive into the staff’s computer while still pretending to be typing something on another computer next to the staff.

Cut to the next scene in the hacker’s lair, where the hacker is sitting in front of a computer with multiple screens, and a stream of confidential information from the bank is being transferred to his computer.


You might have seen similar hacking scenes a dozen times in different movies. The moment you realize that all it takes is one rogue USB drive or accessory plugged into your system for your data to be compromised might have hit you hard. Apple has introduced the accessory security feature as a means of retaliation against the evolving range of such threats. In this blog, we will be looking at how this feature can help you keep your Macs safe from malicious accessories and how you can configure its settings in your Mac.

Elevate your Mac’s security game with Hexnode

What is accessory security?

The new accessory security feature, also known as USB restricted mode, is a security feature that helps protect your Mac against any potentially malicious external Thunderbolt and USB devices. Accessory security puts up a gate whenever you connect an external device to the system. Hence, the device will require the end-user’s permission for communicating with the operating system.

On portable Mac computers with Apple silicon, new USB and Thunderbolt accessories require user approval before the accessory can communicate with macOS for connections wired directly to the USB-C port.

Previously, you could simply attach an external device to your Mac to transfer data or charge it. Mac automatically detects the accessories and gives them access to your computer’s data upon requirement. However, this also paves the way for malicious USB and Thunderbolt devices to damage your system quickly. The latest security addition is guaranteed to provide valuable protection against such hardware exploits.

Be mindful of your tech terrain

No matter how secure you think your tech environment is, there will always be vulnerabilities that a cyber-terrorist might take advantage of. According to recent studies, executives of military, aerospace, journalism, energy, and political sectors are the ones who majorly fall victim to these crimes. Although cyberterrorists aim for high-value targets, that might not always be the case. Another side of this that even security professionals fail to notice is commercial espionage. Administrative personnel, engineers, and even frontline workers can be possible targets for obtaining valuable company information.


Attackers often look for the weakest link to enter a private network. Let’s look at some scenarios where this can happen;
  • Globetrotter executives who leave their laptops in the hotel room when they go out for dinner.
  • Interactive kiosks in airports, hotels and stores.
  • Desktop computers at the front desk of offices with exposed ports.
  • Computers used for billing in retail stores and supermarkets.

Situations like these are more than enough for someone with malicious intent to exploit the hardware. Even if the device is locked or in sleep mode, hackers can use methods like cold boot attacks and DMA attacks to boot up the computer and carry out the attack.

Attackers even come up with techniques such as USB drop and Juice jacking, which tempt the end-user themselves to plug the malicious drive into their systems. An interesting study conducted in 2016 showed that 45% of people plugged in a USB stick that they found lying around in the street. Although the study is a few years old, one can claim that the numbers may not have changed a lot.

Juice jacking

Accessory security window
Smartphone charging board at the airport

Juice jacking is a cyber-attack in which attackers use an infected USB charging station to exploit the connected devices. This attack is mainly seen in public places such as airports, shopping malls, etc., where free charging stations exist. The attacker might use an infected connecting cable in the charging station and leave it plugged in, hoping that an unsuspecting person would plug their device into the ‘forgotten’ cable. Devices running on macOS are particularly vulnerable to this type of attack, as it used to automatically grant permission to transfer data from the Mac once it is plugged in.

Accessory security – how does it work?

The working of the accessory security feature is rather straight-forward. When you connect an accessory to your Mac, it will ask for permission to connect the USB accessory. The device can only communicate with your Mac if you click Allow. However, accessories plugged in but not approved can still be charged.

Allow accessory to connect
Accessory security pop-up
 

If your Mac is locked when you plug in the accessory, you must unlock it first and grant permission. All accessories connected are automatically allowed while upgrading macOS to Ventura. However, it might not be remembered once you restart your device. Therefore, you might have to grant permission again after unlocking.

OS and device requirements

Operating system : macOS Ventura version 13.0 and above.

Device model : Available on Apple Silicon Macs such as MacBook Air M1, MacBook Pro M1, MacBook Air M2, and so on.

How to configure accessory security settings?

The accessory security feature is turned on by default in Macs running macOS Ventura. However, some users might feel their environment is safe and find it annoying to have accessories asking permission whenever they connect an accessory. In such cases, you can disable or change the security settings to suit your preference.

To configure the accessory security settings, follow these steps;

  1. Open System Settings from the Apple Menu.
  2. Open Privacy & Security tab from the left sidebar.
  3. Now scroll down to the Security section.
  4. Click on the dropdown box next to the Allow accessories to connect section and choose your preferred option.

Accessory security window
Accessory security window
 

There are four options available for you to manage your accessory connections;

  • Ask Every Time (most secure): You must grant permission each time you connect an accessory, whether a new one or an already approved one.
  • Ask for New Accessories (default): It asks for approval every time you connect a new accessory. Already approved accessories will be connected automatically.
  • Automatically When Unlocked: All accessories are allowed without extra approval when the device is unlocked.
  • Always (least secure): All USB and Thunderbolt accessories are allowed even when the device is locked.

You must provide the Administrator username and password to change the accessory security settings.

Building your digital fortress

In conclusion, the accessory security feature is a game-changer in protecting your Macs from unauthorized data transfer. It gives you control over what data is being transferred and by whom. However, it is always better to fortify your defenses than be exposed to unwanted threats. You can take advantage of third-party antivirus software and devices such as USB data blockers to ensure the accessories you use are safe.

Another way to safeguard your macOS devices is to couple them with a UEM solution such as Hexnode. As the saying goes, a chain is only as strong as its weakest link. Hexnode can help you ensure you have complete control over your devices in terms of both security and management. Hexnode follows a zero-trust approach encompassing multi-level threat monitoring, detection and protection.

Featured resource

Hexnode Mac management

Get started with Hexnode’s Mac Management solution to save your time and the associated IT operational costs of managing your Mac devices.

DOWNLOAD PDF

You can enhance the security of your Macs by enforcing passwords, user access control, and web-content filtering policies. You can even manage FileVault with Hexnode, which lets you easily encrypt and decrypt your device data. This is just the tip of the iceberg. There are still plenty of features available to build a multi-faceted security infrastructure around your device fleet. So, get started and upgrade your security framework right away with Hexnode.

Share
Aiden Ramirez

Product Evangelist @ Hexnode. Hey Ferb, I know what we're gonna do today!

Share your thoughts