Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 2 / 10
184 résultats taggé macos  ✕
Gergely's hack blog – badmalloc (CVE-2023-32428) - a macOS LPE https://gergelykalman.com/badmalloc-CVE-2023-32428-a-macos-lpe.html
28/11/2024 10:22:57
QRCode
archive.org

I recently realised that I still owe you guys some writeups, so since OBTSv7 is around the corner here's the one for badmalloc. I found this back in March 2023, and it got fixed in October. About the bug There's a bug in MallocStackLogging, Apple's "magical" framework that allows developers …

gergelykalman EN 2024 macOS 0day CVE-2023-32428 MallocStackLogging macos
Source Code of $3,000-a-Month macOS Malware ‘Banshee Stealer’ Leaked https://www.securityweek.com/source-code-of-3000-a-month-macos-malware-banshee-stealer-leaked/
27/11/2024 16:48:46
QRCode
archive.org

The Banshee Stealer macOS malware operation, which emerged earlier this year, was reportedly shut down following a source code leak.

securityweek EN 2024 macOS Malware BANSHEE Stealer leaked
Apple fixes two zero-days used in attacks on Intel-based Macs https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-days-used-in-attacks-on-intel-based-macs/
23/11/2024 10:10:00
QRCode
archive.org
thumbnail

Apple released emergency security updates to fix two zero-day vulnerabilities that were exploited in attacks on Intel-based Mac systems.

"Apple is aware of a report that this issue may have been exploited," the company said in an advisory issued on Tuesday.

The two bugs were found in the macOS Sequoia JavaScriptCore (CVE-2024-44308) and WebKit (CVE-2024-44309) components of macOS.

bleepingcomputer EN 2024 CVE-2024-44309 CVE-2024-44308 macos JavaScriptCore WebKit exploited
Stealthy Attributes of APT Lazarus: Evading Detection with Extended Attributes https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/
14/11/2024 00:02:10
QRCode
archive.org

APT Lazarus has begun attempting to smuggle code using custom extended attributes.

Extended attributes are metadata that can be associated with files and directories in various file systems. They allow users to store additional information about a file beyond the standard attributes like file size, timestamps, and permissions.

group-ib EN 2024 Extended attributes macos Smuggling APT Lazarus
Uncovering Apple Vulnerabilities: The diskarbitrationd and storagekitd Audit Story Part 1 https://www.kandji.io/blog/macos-audit-story-part1
13/11/2024 09:15:02
QRCode
archive.org
thumbnail

Kandji's Threat Research team performed an audit on the macOS diskarbitrationd & storagekitd system daemons, uncovering several (now fixed) vulnerabilities

kandji EN 2024 research macOS diskarbitrationd audit storagekitd vulnerabilities
North Korean hackers employ new tactics to compromise crypto-related businesses - Help Net Security https://www.helpnetsecurity.com/2024/11/07/north-korean-crypto-related-phishing/
11/11/2024 09:09:03
QRCode
archive.org
thumbnail

North Korean hackers are targeting crypto-related businesses with phishing emails and novel macOS-specific malware.

helpnetsecurity EN 2024 NorthKorea macOS crypto-related malware phishing
BlueNoroff Hidden Risk | Threat Actor Targets Macs with Fake Crypto News and Novel Persistence https://www.sentinelone.com/labs/bluenoroff-hidden-risk-threat-actor-targets-macs-with-fake-crypto-news-and-novel-persistence/
08/11/2024 15:37:11
QRCode
archive.org
thumbnail

SentinelLabs has observed a suspected DPRK threat actor targeting Crypto-related businesses with novel multi-stage malware.

sentinelone EN 2024 BlueNoroff DPRK Crypto businesses multi-stage malware macOS
A New Era of macOS Sandbox Escapes: Diving into an Overlooked Attack Surface and Uncovering 10+ New Vulnerabilities – Mickey's Blogs – Exploring the world with my sword of debugger :) https://jhftss.github.io/A-New-Era-of-macOS-Sandbox-Escapes/
07/11/2024 12:05:33
QRCode
archive.org

A New Era of macOS Sandbox Escapes: Diving into an Overlooked Attack Surface and Uncovering 10+ New Vulnerabilities
This is a blog post for my presentation at the conference POC2024. The slides are uploaded here.

In the macOS system, most processes are running in a restricted sandbox environment, whether they are Apple’s own services or third-party applications. Consequently, once an attacker gains Remote Code Execution (RCE) from these processes, their capabilities are constrained. The next step for the attacker is to circumvent the sandbox to gain enhanced execution capabilities and broader file access permissions.

But how to discover sandbox escape vulnerabilities? Upon reviewing the existing issues, I unearthed a significant overlooked attack surface and a novel attack technique. This led to the discovery of multiple new sandbox escape vulnerabilities: CVE-2023-27944, CVE-2023-32414, CVE-2023-32404, CVE-2023-41077, CVE-2023-42961, CVE-2024-27864, CVE-2023-42977, and more.

jhftss EN 2024 macOS research vulnerabilies Sandbox Escapes CVE-2023-27944 CVE-2023-32414 CVE-2023-32404 CVE-2023-41077 CVE-2023-42961 CVE-2024-27864 CVE-2023-42977
Update your iPhone, Mac, Watch: Apple issues patches for several vulnerabilities | Malwarebytes https://www.malwarebytes.com/blog/news/2024/10/update-your-iphone-mac-watch-apple-issues-patches-for-several-vulnerabilities
31/10/2024 11:01:13
QRCode
archive.org
thumbnail

Apple has issued patches for several of its operating systems. The ones for iOS and iPadOS deserve your immediate attention.

malwarebytes EN 2024 Apple macOS iOS patch iPadOS CVE-2024-44274 CVE-2024-44282 CVE-2024-40867
macOS NotLockBit | Evolving Ransomware Samples Suggest a Threat Actor Sharpening Its Tools https://www.sentinelone.com/blog/macos-notlockbit-evolving-ransomware-samples-suggest-a-threat-actor-sharpening-its-tools/
23/10/2024 21:05:49
QRCode
archive.org
thumbnail

An unknown threat actor is developing ransomware to lock files and steal data on macOS, and it's not LockBit.

sentinelone EN 2024 macOS NotLockBit ransomware
New macOS malware HZ RAT lets attackers control Macs remotely https://moonlock.com/macos-malware-hz-rat
20/09/2024 08:51:58
QRCode
archive.org
thumbnail

It lets attackers control Macs remotely.

moonlock EN 2024 macOS malware HZRAT RAT analysis
Zero-Click Calendar invite — Critical zero-click vulnerability chain in macOS https://mikko-kenttala.medium.com/zero-click-calendar-invite-critical-zero-click-vulnerability-chain-in-macos-a7a434fc887b
14/09/2024 21:10:30
QRCode
archive.org

I found a zero-click vulnerability in macOS Calendar, which allows an attacker to add or delete arbitrary files inside the Calendar sandbox environment. This could lead to many bad things including malicious code execution which can be combined with security protection evasion with Photos to compromise users’ sensitive Photos iCloud Photos data. Apple has fixed all of the vulnerabilities between October 2022 and September 2023.

mikko-kenttala EN 2024 Critical zero-click macos vulnerability
Docker-OSX image used for security research hit by Apple DMCA takedown https://www.bleepingcomputer.com/news/security/docker-osx-image-used-for-security-research-hit-by-apple-dmca-takedown/
02/09/2024 11:33:30
QRCode
archive.org
thumbnail

The popular Docker-OSX project has been removed from Docker Hub after Apple filed a DMCA (Digital Millennium Copyright Act) takedown request, alleging that it violated its copyright.

bleepingcomputer EN 2024 Apple DMCA Docker-Hub Legal macOS
HZ Rat backdoor for macOS harvests data from WeChat and DingTalk https://securelist.com/hz-rat-attacks-wechat-and-dingtalk/113513/
28/08/2024 20:42:23
QRCode
archive.org
thumbnail

Kaspersky experts discovered a macOS version of the HZ Rat backdoor, which collects user data from WeChat and DingTalk messengers.

securelist EN 2024 HZRat Apple MacOS Backdoor Instant-Messengers Malware Malware-Descriptions shell Trojan
MacOS X Malware Development https://0xf00sec.github.io/0x1A
25/08/2024 23:26:49
QRCode
archive.org

In today’s post, We’ll explore the process of designing and developing malware for macOS, which is a Unix-based operating system. We’ll use a classic approach to understanding Apple’s internals. To follow along, you should have a basic understanding of exploitation, as well as knowledge of C and Python programming, and some familiarity with low-level assembly language. While the topics may be advanced, I’ll do my best to present them smoothly.

0xf00sec EN 2024 MacOS Malware Development process Python technique
Cthulhu Stealer malware aimed to take macOS user data https://appleinsider.com/articles/24/08/23/evolved-and-more-powerful-macos-malware-strain-sold-cheaply-to-criminals
24/08/2024 12:17:33
QRCode
archive.org
thumbnail

Researchers have discovered another data-seizing macOS malware, with "Cthulhu Stealer" sold to online criminals for just $500 a month.

appleinsider EN 2024 Cthulhu-Stealer MaaS macos
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS https://www.cadosecurity.com/blog/from-the-depths-analyzing-the-cthulhu-stealer-malware-for-macos
24/08/2024 12:13:11
QRCode
archive.org
thumbnail

Cado Security has identified a malware-as-a-service (MaaS) targeting macOS users named “Cthulhu Stealer”.

cadosecurity EN 2024 Cthulhu-Stealer macos analysis MaaS malware-as-a-service
How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions https://blog.talosintelligence.com/how-multiple-vulnerabilities-in-microsoft-apps-for-macos-pave-the-way-to-stealing-permissions/
20/08/2024 09:14:14
QRCode
archive.org
thumbnail

An adversary could exploit these vulnerabilities by injecting malicious libraries into Microsoft's applications to gain their entitlements and user-granted permissions.

talosintelligence EN 2024 vulnerabilities Microsoft apps macos Outlook
Beyond the wail: deconstructing the BANSHEE infostealer https://www.elastic.co/security-labs/beyond-the-wail
16/08/2024 17:35:09
QRCode
archive.org
thumbnail

The BANSHEE malware is a macOS-based infostealer that targets system information, browser data, and cryptocurrency wallets.

elastic.co EN 2024 macOS BANSHEE infostealer
The Hidden Treasures of Crash Reports https://objective-see.org/blog/blog_0x7B.html?mc_cid=cc6f2fb89f&mc_eid=0d9a12074d
15/08/2024 07:06:53
QRCode
archive.org
thumbnail

Sadly, nobody really loves crash reports, but I’m here to change that!

This research, a crash course on crash reports, will highlight how these often overlooked files are an invaluable source of information, capable of revealing malware infections, exploitation attempts, or even buggy (exploitable?) system code. Such insights are critical for defense and offense, empowering us to either protect or exploit macOS systems.

objective-see EN 2024 crash-report course Hidden analysis macos
page 2 / 10
4507 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio