Tag: macOS
-
Albabat Ransomware Targets Windows, Linux, and macOS via GitHub Abuse
Recent research by Trend Micro has uncovered a significant evolution in the Albabat ransomware, which now targets not only Windows but also Linux and macOS systems. This expansion highlights the increasing sophistication of ransomware groups in exploiting multiple operating systems to maximize their impact. The Albabat group has been leveraging GitHub to streamline its operations,…
-
Albabat Ransomware Evolves to Target Linux and macOS
Trend Micro observed a continuous development of Albabat ransomware, designed to expand attacks and streamline operations First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/albabat-ransomware-linux-macos/
-
Xcode Projects Targeted By New XCSSET macOS Malware Variant
First seen on scworld.com Jump to article: www.scworld.com/brief/xcode-projects-targeted-by-new-xcsset-macos-malware-variant
-
XCSSET macOS malware variant targets Xcode projects of app developers
First seen on scworld.com Jump to article: www.scworld.com/news/xcsset-macos-malware-variant-targets-xcode-projects-of-app-developers
-
Apple Rolls Out Critical Security Fixes: iOS 18.3.2, macOS Ventura, and More Receive Important Updates
Apple has released a series of crucial security updates designed to patch vulnerabilities across its ecosystem of devices. On March 11, 2025, the tech giant rolled the Apple security update with iOS 18.3.2, iPadOS 18.3.2, macOS Ventura, macOS Sonoma, macOS Sequoia, visionOS 2.3.2, and tvOS 18.3.1, addressing multiple security flaws that could potentially have been…
-
iPhone-Nutzer attackiert: Aktiv ausgenutzte Webkit-Lücke gefährdet Apple-Geräte
Angreifer können durch die Schwachstelle aus der Web-Content-Sandbox von Webkit ausbrechen. Apple verteilt Notfallupdates für iOS, MacOS und Safari. First seen on golem.de Jump to article: www.golem.de/news/iphone-nutzer-attackiert-aktiv-ausgenutzte-webkit-luecke-gefaehrdet-apple-geraete-2503-194203.html
-
macOS NULL Pointer Dereference Vulnerability Allow Attackers Exploits Kernel
Historically, NULL pointer dereferences have been a significant vulnerability in operating systems, including macOS. These occur when software attempts to access memory at address 0 via a NULL pointer, leading to potential crashes or, under certain conditions, exploitation by attackers. In the past, attackers could exploit such vulnerabilities by mapping controlled memory at address 0,…
-
Linux, macOS users infected with malware posing as legitimate Go packages
Campaign is tailor-made for persistence : The repeated use of identical filenames, array-based string obfuscation, and delayed execution tactics strongly suggests a coordinated adversary who plans to persist and adapt, the researchers added.The presence of multiple malicious Hypert and Layout packages along with several fallback domains also suggests a resilient infrastructure. This setup will allow threat…
-
Typosquatting campaign targets financial sector Linux, macOS systems
First seen on scworld.com Jump to article: www.scworld.com/news/typosquatting-campaign-targets-financial-sector-linux-macos-systems
-
Malware Infects Linux and macOS via Typosquatted Go Packages
Socket exposes a typosquatting campaign delivering malware to Linux and macOS systems via malicious Go packages. Discover the… First seen on hackread.com Jump to article: hackread.com/malware-infects-linux-macos-typosquatted-go-packages/
-
Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems
Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems.”The threat actor has published at least seven packages impersonating widely used Go libraries, including one (github[.]com/shallowmulti/hypert) that appears to target financial-sector developers First seen on thehackernews.com…
-
Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities
Google has rolled out Chrome 134 to the stable channel for Windows, macOS, and Linux, addressing14 security vulnerabilities”, including high-severity flaws that could enable remote code execution or crashes. The update, version 134.0.6998.35 for Linux, 134.0.6998.35/36 for Windows, and 134.0.6998.44/45 for macOS, follows weeks of testing and includes critical fixes for vulnerabilities in components like…
-
North Korean Hackers Deploy RustDoor and Koi Stealer to Target Cryptocurrency Developers on macOS
A recent cybersecurity report from Unit 42 has revealed a new wave of North Korean-linked cyberattacks targeting macOS First seen on securityonline.info Jump to article: securityonline.info/north-korean-hackers-deploy-rustdoor-and-koi-stealer-to-target-cryptocurrency-developers-on-macos/
-
LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram.LightSpy is the name given to a modular spyware that’s capable of infecting both Windows and Apple systems with an aim to harvest…
-
Parallels Desktop: Zero-Day-Exploit verleiht Angreifern Root-Zugriff auf MacOS
Eigentlich gibt es für die Sicherheitslücke längst einen Patch. Effektiv ist dieser aber wohl nicht. Ein Forscher zeigt, wie er sich umgehen lässt. First seen on golem.de Jump to article: www.golem.de/news/patch-laesst-sich-umgehen-root-luecke-in-parallels-desktop-gefaehrdet-mac-nutzer-2502-193685.html
-
Parallels Desktop: Zero-Day-Exploit verleiht Angreifern unter MacOS Root-Rechte
Eigentlich gibt es für die Sicherheitslücke längst einen Patch. Effektiv ist dieser aber wohl nicht. Ein Forscher zeigt, wie er sich umgehen lässt. First seen on golem.de Jump to article: www.golem.de/news/patch-laesst-sich-umgehen-root-luecke-in-parallels-desktop-gefaehrdet-mac-nutzer-2502-193685.html
-
LightSpy Malware Expands With 100+ Commands to Target Users Across All Major OS Platforms
The LightSpy surveillance framework has significantly evolved its operational capabilities, now supporting over 100 commands to infiltrate Android, iOS, Windows, macOS, and Linux systems, and routers, according to new infrastructure analysis. First documented in 2020, this modular malware has shifted from targeting messaging applications to focusing on social media database extraction and cross-platform surveillance, marking…
-
Parallels Desktop 0-Day Exploit Enables Root Privileges PoC Released
A critical zero-day vulnerability in Parallels Desktop virtualization software has been publicly disclosed after seven months of unresolved reporting, enabling attackers to escalate privileges to the root level on macOS systems. The proof-of-concept (PoC) exploit code demonstrates two distinct bypass methods that circumvent existing patches for CVE-2024-34331, a previously addressed privilege escalation flaw. Technical Overview…
-
Zero Trust World: MacOS malware risks and protections
First seen on scworld.com Jump to article: www.scworld.com/resource/zero-trust-world-macos-malware-risks-and-protections
-
Novel FrigidStealer macOS malware spread via bogus browser updates
First seen on scworld.com Jump to article: www.scworld.com/brief/novel-frigidstealer-macos-malware-spread-via-bogus-browser-updates
-
Russian cyberespionage groups target Signal users with fake group invites
QR codes provide a means of phishing Signal users: These features now work by scanning QR codes that contain the cryptographic information needed to exchange keys between different devices in a group or to authorize a new device to an account. The QR codes are actually representations of special links that the Signal application knows…
-
New FrigidStealer infostealer infects Macs via fake browser updates
The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 and TA2727, running campaigns that push a new macOS infostealer malware called FrigidStealer. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-frigidstealer-infostealer-infects-macs-via-fake-browser-updates/
-
New FrigidStealer macOS Malware Distributed as Fake Browser Update
A recently identified macOS infostealer named FrigidStealer has been distributed through a compromised website, as a fake browser update. The post New FrigidStealer macOS Malware Distributed as Fake Browser Update appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/new-frigidstealer-macos-malware-distributed-as-fake-browser-update/
-
Microsoft warns that the powerful XCSSET macOS malware is back with new tricks
XCSSET has been targeting Mac users since 2020. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/02/microsoft-warns-that-the-powerful-xcsset-macos-malware-is-back-with-new-tricks/
-
Hackers use ‘sophisticated’ macOS malware to steal cryptocurrency, Microsoft says
In a report released on Monday, threat intelligence specialists at Microsoft said that they have discovered the new XCSSET strain in limited attacks. XCSSET, first spotted in the wild in August 2020, spreads by infecting Xcode projects, which developers use to create apps for Apple devices. First seen on therecord.media Jump to article: therecord.media/hackers-use-macos-malware-to-steal-crypto
-
New Variant of macOS Threat XCSSET Spotted in the Wild
Microsoft is warning the modular and potentially wormable Apple-focused infostealer boasts new capabilities for obfuscation, persistence, and infection, and could lead to a supply chain attack. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/microsoft-variant-macos-threat-xcsset
-
Novel XCSSET macOS Malware Variant Emerges
First seen on scworld.com Jump to article: www.scworld.com/brief/novel-xcsset-macos-variant-emerges

