Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Saw this form another article in the comments:

"For those wondering, from the external blog post there are two scripts written to disk that should indicate if you have it, the locations are:

/tmp/agent.sh and ~/Library/Application Support/verx_updater/verx.sh"
 
Stay away from torrent sites 👏

Don’t install pirate apps 👏

Stay away from illegal streaming sites 👏

Stay away from crypto sites and crypto apps 👏

Always remember that open source apps on GitHub doesn’t mean they are malware free if all the devs are in on it 👏

Don’t click on shortened URLs sent or posted by anon accounts on social media 👏

Don’t install more apps than you really need 👏

Only use signed apps from well known developers 👏

Delete Facebook 👏
 
If Apple really had automated detection and scanning, how did it manage to infect so many machines?

Probably because there's no malicious payload? " Apple also reiterated that Red Canary found no evidence to suggest the malware has delivered a malicious payload to Macs that have already been infected."

Also, it would be unrealistic to expect an automated scanner to detect all infections.
 
I agree. Windows defender isn't great, but at least it's something. Some sort of basic built in scanner would be a nice feature.
Apple already has active scanning. But there will always be something new to get around whatever security was in place. I remind myself no system is 100% secure. It's nearly impossible to engineer something that can't be infected if it is talking on a network. It's the same reason humans still get colds.
 
  • Like
Reactions: sgtaylor5
Developer certificates…

“Since February 2020, for example, Apple has required all Mac software distributed with a Developer ID outside of the Mac App Store to be submitted to Apple's notary service, an automated system that scans for malicious content and code-signing issues.”

It seems Apples 3rd party s/w vetting and release system and its processes are ripe for rethinking.

Apple searched for "malicious content" and didn't find any. Because there wasn't actually any.
 
Saw this form another article in the comments:

"For those wondering, from the external blog post there are two scripts written to disk that should indicate if you have it, the locations are:

/tmp/agent.sh and ~/Library/Application Support/verx_updater/verx.sh"
So if I dont have these two files, that means my Macs are clean right? gosh, we have to deal with Covid-19 out there and Sparrow virus inside our Macs. what a world!@#$
 
Malwarebytes makes a free downloadable scanner. If you are worried, download and run that.

AS FAR AS I KNOW the above recommend "Clean my Mac" IS MALWARE.
No it's not been using it for many many years, maybe you should check it out before making such a statement......
 
Developer certificates…

“Since February 2020, for example, Apple has required all Mac software distributed with a Developer ID outside of the Mac App Store to be submitted to Apple's notary service, an automated system that scans for malicious content and code-signing issues.”

It seems Apples 3rd party s/w vetting and release system and its processes are ripe for rethinking.
No, the notarization process worked as intended.

It's an automated process that scans apps for known signatures and automatically rejects, but just because it didn't detect an unknown one doesn't mean it failed, Apple was still able to revoke the certificates and that prevents the malware from running.
 
This is going to end up the same way as all DRM - inconveniencing genuine users whilst bad guys find ways around it.

If Apple really had automated detection and scanning, how did it manage to infect so many machines?
Because the signature wasn't known

You could say the same about every piece of anti-virus software out there that fails to detect new stuff, but the difference here is that the ability to prevent execution of the malware is baked into the OS.
 
Something tells me that the issue, deep down, is not solved. Yeah, Apple has revoqued the certificate, so then what? Can this happen again? I’d say yes...
Do we even know how this was able to infect over 30,000 M1 Macs?
>Was it user error?
>Was it preinstalled from China?
>Was it from an infected app on the app store?

Apple knows about it BUT what is Apple doing about it?

It is alarming such a virus spread so quickly after the release of the M1 chip.
 
This malware wasn't a vulnerability in MacOS or software; you've got to actually install it purposely, no? In which case whilst it would have been improved by pulling the developer cert faster, this is still better than what you'll get on most OSes. I.E., put in your password, and you're screwed.
 
OK in term ran "/tmp/agent.sh and ~/Library/Application Support/verx_updater/verx.sh" and it does not exist - whew
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.