article thumbnail

Good old malware for the new Apple Silicon platform

SecureList

For example, a sample with the MD5 hash sum 914e49921c19fffd7443deee6ee161a4 contains two architectures: x86_64 and ARM64. The first one corresponds to previous-generation, Intel-based Mac computers, but the second one is compiled for ARM64 architecture, which means that it can run on computers with the new Apple M1 chip.

Adware 139
article thumbnail

Second malware strain primed to attack Appleā€™s new M1 chip identified

SC Magazine

Along with the Pirrit Mac adware identified earlier this week, researchers from Red Canary identified Thursday a different malware strain (Jon Rawlinson/CC BY 2.0)). 14 noting that a Safari adware extension that was originally written to run on Intel x86 chips was revamped to run on the new M1 chips.

Malware 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New variant for Mac Malware XCSSET compiled for M1 Chips

Security Affairs

For example, a sample with the MD5 hash sum 914e49921c19fffd7443deee6ee161a4 contains two architectures: x86_64 and ARM64.” “The first one corresponds to previous-generation, Intel-based Mac computers, but the second one is compiled for ARM64 architecture, which means that it can run on computers with the new Apple M1 chip.”

Malware 98
article thumbnail

Silver Sparrow, a new malware infects Mac systems using Apple M1 chip

Security Affairs

“However, our investigation almost immediately revealed that this malware, whatever it was, did not exhibit the behaviors that weā€™ve come to expect from the usual adware that so often targets macOS systems.” The adware writes each of its components out line by line with JavaScript commands.

Malware 142
article thumbnail

Scranos ā€“ A Cross Platform, Rootkit-Enabled Spyware rapidly spreading

Security Affairs

Although the campaign has not reached the magnitude of the Zacinlo adware campaign, it is already infecting users worldwide.” ” Scranos implements a modular architecture, with many components in the early stage of development. Experts reported that it is already infecting users worldwide.

Spyware 66
article thumbnail

IT threat evolution Q1 2021

SecureList

The Apple M1, a direct relative of the processors used in the iPhone and iPad, will ultimately allow Apple to unify its software under a single architecture. Just a few months after the release of the first Apple M1 computers, malware writers had already recompiled their code to adapt it to the new architecture. Secondhand news.

Malware 100
article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

Poor Maintenance The best security tools and architecture will be undermined by poor maintenance practices. For example, malware, spyware, adware, computer worms, botnets, trojan horses and similar malware do not normally impact network equipment (routers, firewalls, etc.) or network traffic.