![]() ![]() One of Silver Sparrow’s more advanced features is the ability to run natively on the M1 chip, which Apple introduced to macOS in November. At first considered a reasonably dangerous threat (researchers now believe it’s a form of adware), Silver Sparrow is nevertheless a malware family of intrigue for showcasing “mature” capabilities, such as the ability to remove itself, which is usually reserved for stealth operations. Silver Sparrow is a new Mac malware that swooped in on February 18 and was found on nearly 40,000 endpoints by Malwarebytes detection engines. (Note: These are a different three vulnerabilities than the zero-days found in November.) And just a couple weeks ago, there was Silver Sparrow. While Apple didn’t comment on whether this particular vulnerability had been discovered by cybercriminals, the company released patches for three separate security bugs that were being actively exploited in January 2021. Reading between the lines, this means its browsers were vulnerable to exploits that could be launched from malicious website content, including images and ads. Just last week, the company released a patch for iPhone, iPad, and MacBook for a bug that could allow code execution through websites hosting malicious code. Unfortunately, 2021 is proving to be similarly rotten for Apple. In November 2020, Apple released patches for three zero-day vulnerabilities in iOS and iPadOS that were being actively exploited in the wild. A zero-click exploit remained unpatched for six months of 2020, leaving innocent iPhone users unaware that anyone nearby could completely take over their device without touching it. ThiefQuest, a Mac malware masquerading as ransomware, was discovered in mid-2020.ĭespite having the most locked-down security system of Apple’s platforms, iOS was particularly pummelled in the last year. ![]() Some of these made their way into the wild others appeared on journalists’ iPhones. In the 2020 State of Malware Report, Malwarebytes researchers found that Mac malware-primarily backdoors, data stealers, and cryptominers-had risen by 61 percent over the previous year.Ģ020 served Apple users with a number of targeted attacks using RATs and APTs developed by nation-state actors from China, North Korea, and Vietnam. However, from the start of 2020 onward, the malicious momentum has been building. The iOS vulnerability exploited by checkm8 rattled quite a few cages in late 2019. ![]() Several effective Mac-facing miners joined the crypto-rush in 2018. But over the last few years, credible threats, exploits, and hacks of Apple products have become more persistent. In fact, news on Apple cyberthreats wasn’t just infrequent-it was inconsequential. It seems like only yesterday there weren’t many breaking news stories on Mac security threats to bite into. But instead of welcoming allied assistance via third-party security vendors, Apple is closing the gate. From an endpoint security framework overhaul of macOS Catalina to phasing out kernel extensions, the tech giant has been battening down the hatches-especially of macOS and Mac computer hardware.ĭespite Apple’s best efforts-or perhaps as a result of them-the Mac threat landscape has become even more dangerous. ![]() Over the last few months, Apple has ramped up security efforts across its platforms. There’s a lot going on in the Mac security world lately. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |