Skip to main content

Zoom’s one-click installation on Mac was always too good to be true

With so many people stuck at home due to the coronavirus pandemic, videoconferencing app Zoom has become immensely popular.

For many people (ourselves included), its best feature on the Mac was its incredibly simple one-click installation. Now, that’s gone. And while that’s a good thing for us, it’s not great for Zoom.

The prerequirement script

As it turns out, Zoom was doing something rather shady during the installation process. As documented by Felix Seele, technical lead at tech security firm VMRay, Zoom’s installer was abusing the MacOS installation process to bypass user consent. In some cases, it was even masquerading as the operating system in order to trick the user. It’s not the first time Zoom has been caught doing something dubious, and comes hot on the heels of news that Zoom’s privacy policy is highly questionable, which led to the company freezing development until it can sort itself out.

Here’s how the MacOS installation process normally works. You download the installer file — usually a DMG or PKG file — and double-click it to get started. In many cases, you’ll go straight to the installer, which presents a few pages giving you various installation options. Sometimes, though, you’ll see a dialog box explaining that the installer needs to determine if the app can run on your system. This is called a “prerequirement script.” Once it’s finished, the regular installation process begins.

Ever wondered how the @zoom_us macOS installer does it’s job without you ever clicking install? Turns out they (ab)use preinstallation scripts, manually unpack the app using a bundled 7zip and install it to /Applications if the current user is in the admin group (no root needed).

— Felix (@c1truz_) March 30, 2020

Zoom’s installer abused this prerequirement script to bypass the regular installation process — and your consent. When Zoom told you it was running a prerequirement script and doing a few tests, it was actually installing the app without your knowledge. That’s what made the whole process so quick.

As Seele pointed out on Twitter, while this behavior is “not strictly malicious,” it is “very shady and definitely leaves a bitter aftertaste.” Apps that try to circumvent Apple’s processes and bypass user consent don’t exactly inspire confidence, after all.

But wait, there’s more

Zoom would adopt this shifty approach if it detected that you did not already have Zoom installed on your Mac. But if you did have it installed but didn’t have appropriate permissions to update it (say, if your Mac is part of your employer’s network and so has certain restrictions), Zoom would do something downright suspicious.

As Seele noted, in this situation, Zoom would launch something called “zoomAutenticationTool” (complete with typo), which was bundled into the PKG installer. This would spawn a prompt asking for the admin username and password.

However, not only did this make use of a deprecated (and notorious) API that was often abused to grant root privileges, but it did so by impersonating MacOS itself. Instead of being honest and telling the user that Zoom needed the admin password, the popup message would read: “System need your privilege to change” (again, with typos). The intention, apparently, was to trick the user into thinking their computer was asking for the password.

Needless to say, this is not exactly upright behavior. As Seele pointed out, it’s a tactic used by malware to fool people into installing things they shouldn’t. After he exposed these underhanded measures, Zoom apparently moved quickly to remove them. Try installing Zoom on a Mac now and you get the regular installation process.

On Windows? Zoom still has that one-click installer. While that’s great for convenience, given the debacle on Mac, we can’t help but wonder how long that will last.

Editors' Recommendations

Alex Blake
In ancient times, people like Alex would have been shunned for their nerdy ways and strange opinions on cheese. Today, he…
Here’s why WWDC could be a ‘critical event’ for Apple
Apple CEO Tim Cook looks at a display of brand new redesigned MacBook Air laptop during the WWDC22

Apple is planning a packed line-up for its Worldwide Developers Conference (WWDC) on June 5, which could become “one of the most critical events in the company’s history.” Aside from the company’s upcoming Reality Pro headset, there will be major updates to Apple’s software systems, including the biggest watchOS revamp since the Apple Watch launched in 2015.

That’s according to a new report from Bloomberg journalist Mark Gurman, who has a history of accurate predictions and leaks surrounding Apple products. It suggests that WWDC will be a chance for Apple to set out its future ambitions for a “post-iPhone era.”

Read more
This little-known feature is my favorite part of using a Mac and iPhone together
Person using iPhone and MacBook.

Apple’s ecosystem attracts plenty of praise for how all the company’s devices work seamlessly together -- and rightly so. But among all the admiring glances cast toward AirDrop, Continuity Camera and Sidecar, there’s another feature that feels a little unloved -- yet it’s a superb perk of using multiple Apple devices together.

That feature is Universal Clipboard, a handy little timesaver that shuns the spotlight and simply works diligently in the background. Yet that simple nature -- it just works, as the saying goes -- is part of what makes it so great to use.

Read more
Own an iPhone, iPad, or MacBook? Install this critical update right now
IOS 16.4.1 UPDATE.

Apple has released software updates for iPhones and iPads that are light on features, but they are critically important from a security perspective. The updates — iOS 16.4.1 and iPadOS 16.4.1 — started rolling out on Friday, but you should install them on your iPhone and iPad as soon as possible to protect your devices from attacks.

In its official release note, Apple says the updates patch two security flaws that “may have been actively exploited.” Now, Apple doesn’t disclose security issues before conducting thorough research, both in-house and in collaboration with cybersecurity experts. In a nutshell, when Apple publicly announces a security flaw, and it comes with a “Critical Vulnerability” badge, you should grab the fix as soon as Apple makes them available.

Read more