Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 4 / 10
184 résultats taggé macos  ✕
Jamf Threat Labs Discovers Pirated macOS Apps Similar to ZuRu Malware https://www.jamf.com/blog/jtl-malware-pirated-applications/
19/01/2024 09:15:51
QRCode
archive.org
thumbnail

Jamf Threat Labs discovers new pirated macOS applications that establish communication with attacker infrastructure, allowing the victim's computer to be controlled by the attacker.

jamf EN 2024 macOS Malware pirated applications
Why Join The Navy If You Can Be A Pirate? https://objective-see.org/blog/blog_0x79.html
17/01/2024 22:01:42
QRCode
archive.org
thumbnail

Analyzing a pirated application, that contains a (malicious) surprise

A few days ago, malwrhunterteam tweeted about pirated macOS application that appeared to contain malware

And even though as noted in the tweet the sample appeared to be from 2023, it was new to me so I decided to take some time to dig in deeper. Plus, I’m always interested in seeing if Objective-See’s free open-source tools can provide protection against recent macOS threats.

In this blog post we’ll start with the disk image, then hone in on a malicious dynamic library, which turns out just to be the start!

objective-see EN 2024 macOS pirated malicious UltraEdit
The Many Faces of Undetected macOS InfoStealers | KeySteal, Atomic & CherryPie Continue to Adapt https://www.sentinelone.com/blog/the-many-faces-of-undetected-macos-infostealers-keysteal-atomic-cherrypie-continue-to-adapt/
17/01/2024 19:24:26
QRCode
archive.org
thumbnail

Learn about the latest threats to macOS as Infostealers continue to rapidly adapt to evade static signatures.

sentinelone EN 2024 macOS Infostealers Evasion signatures KeySteal CherryPie
MacOS info-stealers quickly evolve to evade XProtect detection https://www.bleepingcomputer.com/news/security/macos-info-stealers-quickly-evolve-to-evade-xprotect-detection/
17/01/2024 19:24:07
QRCode
archive.org
thumbnail

Multiple information stealers for the macOS platform have demonstrated the capability to evade detection even when security companies follow and report about new variants frequently.

bleepingcomputer EN 2024 Information Malware Security Apple Evasion Stealer Info XProtect InfoSec Computer macOS
Analyzing DPRK's SpectralBlur https://objective-see.org/blog/blog_0x78.html
05/01/2024 12:38:58
QRCode
archive.org
thumbnail

In both his twitter (err, X) thread and in a subsequent posting he provided a comprehensive background and triage of the malware dubbed SpectralBlur. In terms of its capabilities he noted:

SpectralBlur is a moderately capable backdoor, that can upload/download files, run a shell, update its configuration, delete files, hibernate or sleep, based on commands issued from the C2. -Greg
He also pointed out similarities to/overlaps with the DPRK malware known as KandyKorn (that we covered in our “Mac Malware of 2024” report), while also pointing out there was differences, leading him to conclude:

We can see some similarities ... to the KandyKorn. But these feel like families developed by different folks with the same sort of requirements. -Greg

objective-see EN 2024 Analysis macOS backdoor SpectralBlur malware
smith (CVE-2023-32434) https://github.com/felix-pb/kfd/blob/main/writeups/smith.md
03/01/2024 13:50:10
QRCode
archive.org

This write-up presents an exploit for a vulnerability in the XNU kernel:

  • Assigned CVE-2023-32434.

  • Fixed in iOS 16.5.1 and macOS 13.4.1.

  • Reachable from the WebContent sandbox and might have been actively exploited.
    *Note that this CVE fixed multiple integer overflows, so it is unclear whether or not the integer overflow used in my exploit was also used in-the-wild. Moreover, if it was, it might not have been exploited in the same way.
    The exploit has been successfully tested on:

  • iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max)

  • macOS 13.1 and 13.4 (MacBook Air M2 2022)

  • All code snippets shown below are from xnu-8792.81.2.

Poulin-Bélanger EN 2023 exploit analysis vulnerability github macos ios CVE-2023-32434
Objective-See's Blog https://objective-see.org/blog/blog_0x77.html
02/01/2024 15:28:28
QRCode
archive.org
thumbnail

A comprehensive analysis of the year's new malware

objective-see EN 2024 retrospective macos malware year analysis
Exploiting GOG Galaxy XPC service for privilege escalation in macOS https://securityintelligence.com/x-force/exploiting-gog-galaxy-xpc-service-privilege-escalation-macos/
16/12/2023 01:04:00
QRCode
archive.org
thumbnail

Unpack the analysis of a GOG Galaxy XPC service vulnerability. More from IBM X-Force Red.

securityintelligence 2023 EN macos GOG client XPC vulnerability
Imperva Uncovers CVE-2023-22524, A RCE Vulnerability https://www.imperva.com/blog/cve-2023-22524-rce-vulnerability-in-atlassian-companion-for-macos/
16/12/2023 01:01:43
QRCode
archive.org
thumbnail

Learn about a RCE vulnerability, discovered by the Imperva Red Team, identified as CVE-2023-22524, in Atlassian Companion for macOS.

imperva EN 2023 RCE vulnerability CVE-2023-22524 Atlassian macOS
Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws https://thehackernews.com/2023/12/apple-releases-security-updates-to.html
12/12/2023 08:50:45
QRCode
archive.org
thumbnail

Apple has released patches for iOS, iPadOS, macOS, tvOS, watchOS, and Safari to address multiple vulnerabilities.

thehackernews EN 2023 Apple Security Updates November2023 iOS macOS tvOS watchOS patch CVE-2023-45866
Analysis of a new macOS Trojan-Proxy https://securelist.com/trojan-proxy-for-macos/111325/
06/12/2023 14:13:42
QRCode
archive.org
thumbnail

A new macOS Trojan-Proxy is riding on cracked versions of legitimate software; it relies on DNS-over-HTTPS to obtain a C&C (command and control) address.
Illegally distributed software historically has served as a way to sneak malware onto victims’ devices. Oftentimes, users are not willing to pay for software tools they need, so they go searching the Web for a “free lunch”. They are an excellent target for cybercriminals who realize that an individual looking for a cracked app will be willing to download an installer from a questionable website and disable security on their machine, and so they will be fairly easy to trick into installing malware as well.

securelist EN 2023 MacOS Trojan Malware Trojan-Proxy Descriptions Technologies Piracy Apple
N. Korean Hackers 'Mixing' macOS Malware Tactics to Evade Detection https://thehackernews.com/2023/11/n-korean-hackers-mixing-and-matching.html
02/12/2023 13:03:23
QRCode
archive.org
thumbnail

The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN have been observed "mixing and matching" different elements of the two disparate attack chains, leveraging RustBucket droppers to deliver KANDYKORN.

thehackernews EN 2023 North-Korea macOS malware KANDYKORN
DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads https://www.sentinelone.com/blog/dprk-crypto-theft-macos-rustbucket-droppers-pivot-to-deliver-kandykorn-payloads/
27/11/2023 20:52:43
QRCode
archive.org
thumbnail

Two apparently separate North Korean crypto theft campaigns targeting macOS users appear to be linked as threat actors mix and match droppers and payloads.

sentinelone EN 2023 North-Korea macOS KandyKorn RustBucket DPRK
Atomic Stealer distributed to Mac users via fake browser updates https://www.malwarebytes.com/blog/threat-intelligence/2023/11/atomic-stealer-distributed-to-mac-users-via-fake-browser-updates
22/11/2023 08:30:47
QRCode
archive.org
thumbnail

Compromised websites are being used to redirect to fake browser updates and deliver malware onto Mac users.

malwarebytes EN 2023 macos Stealer fake browser updates
Apple neglects to patch multiple critical vulnerabilities in macOS https://www.intego.com/mac-security-blog/apple-neglects-to-patch-multiple-critical-vulnerabilities-in-macos/
11/11/2023 10:46:44
QRCode
archive.org
thumbnail

Apple is neglecting to patch high-severity vulnerabilities in open-source components of macOS Sonoma, including curl and LibreSSL.

intego EN 2023 Apple patch high-severity macOS Sonoma curl open-source
Jamf Threat Labs Discovers Malware from BlueNoroff https://www.jamf.com/blog/bluenoroff-strikes-again-with-new-macos-malware/
07/11/2023 18:49:27
QRCode
archive.org
thumbnail

Newly discovered later-stage malware from BlueNoroff APT group targets macOS with characteristics similar to their RustBucket campaign.

jamf EN 2023 Malware macOS BlueNoroff RustBucket analysis
Elastic catches DPRK passing out KANDYKORN — Elastic Security Labs https://www.elastic.co/security-labs/elastic-catches-dprk-passing-out-kandykorn
05/11/2023 17:55:22
QRCode
archive.org
thumbnail

Elastic Security Labs exposes an attempt by the DPRK to infect blockchain engineers with novel macOS malware.

elastic.co EN macOS DPRK blockchain engineers malware targeted
New macOS 'KandyKorn' malware targets cryptocurrency engineers https://www.bleepingcomputer.com/news/security/new-macos-kandykorn-malware-targets-cryptocurrency-engineers/
05/11/2023 11:22:34
QRCode
archive.org

A new macOS malware dubbed 'KandyKorn' has been spotted in a campaign attributed to the North Korean Lazarus hacking group, targeting blockchain engineers of a cryptocurrency exchange platform.

The attackers impersonate members of the cryptocurrency community on Discord channels to spread Python-based modules that trigger a multi-stage KandyKorn infection chain.

Elastic Security discovered and attributed the attacks to Lazarus based on overlaps with past campaigns concerning the employed techniques, network infrastructure, code-signing certificates, and custom Lazarus detection rules.

bleepingcomputer EN 2023 macOS Lazarus Discord Python-based cryptocurrency engineers Targeted
Triangulation: validators, post-compromise activity and modules | Securelist https://securelist.com/triangulation-validators-modules/110847/
26/10/2023 17:49:57
QRCode
archive.org
thumbnail

In this report Kaspersky shares insights into the validation components used in Operation Triangulation, TriangleDB implant post-compromise activity, as well as details of some additional modules.
#2023 #APT #Apple #EN #Malware #Malware-Description #Triangulation #analysis #iOS #macOS #securelist #spyware

EN macOS spyware Apple Malware-Description 2023 analysis APT iOS Triangulation securelist Malware
iLeakage https://ileakage.com/
25/10/2023 23:45:04
QRCode
archive.org

We present iLeakage, a transient execution side channel targeting the Safari web browser present on Macs, iPads and iPhones. iLeakage shows that the Spectre attack is still relevant and exploitable, even after nearly 6 years of effort to mitigate it since its discovery. We show how an attacker can induce Safari to render an arbitrary webpage, subsequently recovering sensitive information present within it using speculative execution. In particular, we demonstrate how Safari allows a malicious webpage to recover secrets from popular high-value targets, such as Gmail inbox content. Finally, we demonstrate the recovery of passwords, in case these are autofilled by credential managers.

ileakage EN 2023 macos Safari Side-Channel ios Spectre speculative
page 4 / 10
4507 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio