article thumbnail

New variant for Mac Malware XCSSET compiled for M1 Chips

Security Affairs

For example, a sample with the MD5 hash sum 914e49921c19fffd7443deee6ee161a4 contains two architectures: x86_64 and ARM64.” “The first one corresponds to previous-generation, Intel-based Mac computers, but the second one is compiled for ARM64 architecture, which means that it can run on computers with the new Apple M1 chip.”

Malware 103
article thumbnail

Scranos – A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Security Affairs

Although the campaign has not reached the magnitude of the Zacinlo adware campaign, it is already infecting users worldwide.” ” Scranos implements a modular architecture, with many components in the early stage of development. Experts reported that it is already infecting users worldwide.

Spyware 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Silver Sparrow, a new malware infects Mac systems using Apple M1 chip

Security Affairs

“However, our investigation almost immediately revealed that this malware, whatever it was, did not exhibit the behaviors that we’ve come to expect from the usual adware that so often targets macOS systems.” The adware writes each of its components out line by line with JavaScript commands.

Malware 143
article thumbnail

IT threat evolution Q1 2021

SecureList

We believe this is a continuation of a campaign last summer, reported by Avast , in which the malware masqueraded as the Malwarebytes antivirus installer. The Apple M1, a direct relative of the processors used in the iPhone and iPad, will ultimately allow Apple to unify its software under a single architecture. Secondhand news.

Malware 93
article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

Endpoint security : protects endpoints with antivirus, endpoint detection and response (EDR) tools, etc. Poor Maintenance The best security tools and architecture will be undermined by poor maintenance practices. endpoint security (antivirus, Endpoint Detection and Response, etc.), or network traffic. for unauthorized access.