Tag: macOS
-
iPhone-Nutzer attackiert: Aktiv ausgenutzte Webkit-Lücke gefährdet Apple-Geräte
Angreifer können durch die Schwachstelle aus der Web-Content-Sandbox von Webkit ausbrechen. Apple verteilt Notfallupdates für iOS, MacOS und Safari. First seen on golem.de Jump to article: www.golem.de/news/iphone-nutzer-attackiert-aktiv-ausgenutzte-webkit-luecke-gefaehrdet-apple-geraete-2503-194203.html
-
macOS NULL Pointer Dereference Vulnerability Allow Attackers Exploits Kernel
Historically, NULL pointer dereferences have been a significant vulnerability in operating systems, including macOS. These occur when software attempts to access memory at address 0 via a NULL pointer, leading to potential crashes or, under certain conditions, exploitation by attackers. In the past, attackers could exploit such vulnerabilities by mapping controlled memory at address 0,…
-
Linux, macOS users infected with malware posing as legitimate Go packages
Campaign is tailor-made for persistence : The repeated use of identical filenames, array-based string obfuscation, and delayed execution tactics strongly suggests a coordinated adversary who plans to persist and adapt, the researchers added.The presence of multiple malicious Hypert and Layout packages along with several fallback domains also suggests a resilient infrastructure. This setup will allow threat…
-
Typosquatting campaign targets financial sector Linux, macOS systems
First seen on scworld.com Jump to article: www.scworld.com/news/typosquatting-campaign-targets-financial-sector-linux-macos-systems
-
Malware Infects Linux and macOS via Typosquatted Go Packages
Socket exposes a typosquatting campaign delivering malware to Linux and macOS systems via malicious Go packages. Discover the… First seen on hackread.com Jump to article: hackread.com/malware-infects-linux-macos-typosquatted-go-packages/
-
Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems
Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS systems.”The threat actor has published at least seven packages impersonating widely used Go libraries, including one (github[.]com/shallowmulti/hypert) that appears to target financial-sector developers First seen on thehackernews.com…
-
Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities
Google has rolled out Chrome 134 to the stable channel for Windows, macOS, and Linux, addressing14 security vulnerabilities”, including high-severity flaws that could enable remote code execution or crashes. The update, version 134.0.6998.35 for Linux, 134.0.6998.35/36 for Windows, and 134.0.6998.44/45 for macOS, follows weeks of testing and includes critical fixes for vulnerabilities in components like…
-
North Korean Hackers Deploy RustDoor and Koi Stealer to Target Cryptocurrency Developers on macOS
A recent cybersecurity report from Unit 42 has revealed a new wave of North Korean-linked cyberattacks targeting macOS First seen on securityonline.info Jump to article: securityonline.info/north-korean-hackers-deploy-rustdoor-and-koi-stealer-to-target-cryptocurrency-developers-on-macos/
-
LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
Cybersecurity researchers have flagged an updated version of the LightSpy implant that comes equipped with an expanded set of data collection features to extract information from social media platforms like Facebook and Instagram.LightSpy is the name given to a modular spyware that’s capable of infecting both Windows and Apple systems with an aim to harvest…
-
Parallels Desktop: Zero-Day-Exploit verleiht Angreifern Root-Zugriff auf MacOS
Eigentlich gibt es für die Sicherheitslücke längst einen Patch. Effektiv ist dieser aber wohl nicht. Ein Forscher zeigt, wie er sich umgehen lässt. First seen on golem.de Jump to article: www.golem.de/news/patch-laesst-sich-umgehen-root-luecke-in-parallels-desktop-gefaehrdet-mac-nutzer-2502-193685.html
-
Parallels Desktop: Zero-Day-Exploit verleiht Angreifern unter MacOS Root-Rechte
Eigentlich gibt es für die Sicherheitslücke längst einen Patch. Effektiv ist dieser aber wohl nicht. Ein Forscher zeigt, wie er sich umgehen lässt. First seen on golem.de Jump to article: www.golem.de/news/patch-laesst-sich-umgehen-root-luecke-in-parallels-desktop-gefaehrdet-mac-nutzer-2502-193685.html
-
LightSpy Malware Expands With 100+ Commands to Target Users Across All Major OS Platforms
The LightSpy surveillance framework has significantly evolved its operational capabilities, now supporting over 100 commands to infiltrate Android, iOS, Windows, macOS, and Linux systems, and routers, according to new infrastructure analysis. First documented in 2020, this modular malware has shifted from targeting messaging applications to focusing on social media database extraction and cross-platform surveillance, marking…
-
Parallels Desktop 0-Day Exploit Enables Root Privileges PoC Released
A critical zero-day vulnerability in Parallels Desktop virtualization software has been publicly disclosed after seven months of unresolved reporting, enabling attackers to escalate privileges to the root level on macOS systems. The proof-of-concept (PoC) exploit code demonstrates two distinct bypass methods that circumvent existing patches for CVE-2024-34331, a previously addressed privilege escalation flaw. Technical Overview…
-
Zero Trust World: MacOS malware risks and protections
First seen on scworld.com Jump to article: www.scworld.com/resource/zero-trust-world-macos-malware-risks-and-protections
-
Novel FrigidStealer macOS malware spread via bogus browser updates
First seen on scworld.com Jump to article: www.scworld.com/brief/novel-frigidstealer-macos-malware-spread-via-bogus-browser-updates
-
Russian cyberespionage groups target Signal users with fake group invites
QR codes provide a means of phishing Signal users: These features now work by scanning QR codes that contain the cryptographic information needed to exchange keys between different devices in a group or to authorize a new device to an account. The QR codes are actually representations of special links that the Signal application knows…
-
New FrigidStealer infostealer infects Macs via fake browser updates
The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 and TA2727, running campaigns that push a new macOS infostealer malware called FrigidStealer. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/new-frigidstealer-infostealer-infects-macs-via-fake-browser-updates/
-
New FrigidStealer macOS Malware Distributed as Fake Browser Update
A recently identified macOS infostealer named FrigidStealer has been distributed through a compromised website, as a fake browser update. The post New FrigidStealer macOS Malware Distributed as Fake Browser Update appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/new-frigidstealer-macos-malware-distributed-as-fake-browser-update/
-
Microsoft warns that the powerful XCSSET macOS malware is back with new tricks
XCSSET has been targeting Mac users since 2020. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/02/microsoft-warns-that-the-powerful-xcsset-macos-malware-is-back-with-new-tricks/
-
Hackers use ‘sophisticated’ macOS malware to steal cryptocurrency, Microsoft says
In a report released on Monday, threat intelligence specialists at Microsoft said that they have discovered the new XCSSET strain in limited attacks. XCSSET, first spotted in the wild in August 2020, spreads by infecting Xcode projects, which developers use to create apps for Apple devices. First seen on therecord.media Jump to article: therecord.media/hackers-use-macos-malware-to-steal-crypto
-
New Variant of macOS Threat XCSSET Spotted in the Wild
Microsoft is warning the modular and potentially wormable Apple-focused infostealer boasts new capabilities for obfuscation, persistence, and infection, and could lead to a supply chain attack. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/microsoft-variant-macos-threat-xcsset
-
Novel XCSSET macOS Malware Variant Emerges
First seen on scworld.com Jump to article: www.scworld.com/brief/novel-xcsset-macos-variant-emerges
-
New XCSSET Malware Variant Targeting macOS Notes App and Wallets
Microsoft warns Apple developers about a new XCSSET malware variant targeting macOS, posing security risks through stealthy infections… First seen on hackread.com Jump to article: hackread.com/xcsset-malware-variant-targets-macos-notes-wallets/
-
New Mac Malware Poses as Browser Updates
Researchers warn of rising macOS-targeted attacks as hackers exploit fake updates to bypass security. FrigidStealer malware highlights growing enterprise risks. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/mac-malware-web-inject-proofpoint/
-
New FrigidStealer Malware Targets macOS Users via Fake Browser Updates
Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple macOS malware known as FrigidStealer.The activity has been attributed to a previously undocumented threat actor known as TA2727, with the information stealers for other platforms such as Windows (Lumma Stealer or DeerStealer) and Android (Marcher).TA2727 is a “threat…
-
Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer
Proofpoint also identified two new threat actors operating components of web inject campaigns, TA2726 and TA2727 First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/proofpoint-frigidstealer-new-mac/
-
XCSSET macOS malware reappears with new attack strategies, Microsoft sounds alarm
Xcode developers targeted through infected projects: Microsoft reported that XCSSET continues to spread via compromised Xcode projects, a technique that has been in use since the malware’s discovery in 2020. Once an infected project is cloned or downloaded, the malware can embed itself within the developer’s system and further propagate when the infected code is…
-
Microsoft Warns of Improved XCSSET macOS Malware
Microsoft has observed a new variant of the XCSSET malware being used in limited attacks against macOS users. The post Microsoft Warns of Improved XCSSET macOS Malware appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/microsoft-warns-of-improvements-to-xcsset-macos-malware/
-
XCSSET: macOS-Malware ist wieder aktiv
Einige Zeit war es ruhig um die Mac-Malware XCSSET. Nun hat Microsoft neue aktive Varianten entdeckt, die Xcode-Projekte befallen. First seen on heise.de Jump to article: www.heise.de/news/XCSSET-macOS-Malware-ist-wieder-aktiv-10285697.html

