![]() This malware has been in the wild, with very few changes, since at least 2019. The malware itself is a pretty full-featured backdoor, but what is most remarkable about it is not its capabilities. The vulnerabilities were used to drop malware onto the computer silently, without the user needing to click on anything or even being aware that anything has happened. This campaign was using two macOS vulnerabilities to infect Macs that simply visited the wrong web page.Ī watering hole attack is one that’s deployed through a website that the desired target is likely to visit, so named because of the way predators will hide near a watering hole that is frequented by their prey. Google’s Threat Analysis Group (TAG) discovered a watering hole campaign in Hong Kong, targeting journalists and pro-democracy political groups. Watering hole campaign discovered by Google ![]() And new Mac malware that was disclosed on Thursday provides a concrete example of why this is not just theory. In theory, this could lead to attacks on those vulnerable systems. Often, systems older than the most current one were left in vulnerable states. His findings showed a shocking number of cases where Apple patched a vulnerability, but did not do so in all of the vulnerable system versions. ![]() As mentioned in some of our previous coverage, security researcher Joshua Long recently shone a light on problems with Apple’s security patching strategy. Apple’s reputation on security has been taking a beating lately.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |