I am talking about the new Malware in general.This can only load when the user allows it.
It’s the dumb user’s fault, for clicking without reading first.
I am talking about the new Malware in general.This can only load when the user allows it.
It’s the dumb user’s fault, for clicking without reading first.
This isn't a "vulnerability".Correct, the information here is that it took 3 months to develop a vulnerability since available for public purchase.
Bit of a non story really. Of course malware exists for the M1 like it does for virtually ever platform/every chip. The fact it is a new chip makes malware more likely, as you only respond to unknown threats on any given chip/platform when they occur. Obviously you try to make provision, but that is impossible to make perfect for every company, especially in the first form of a new chip.
Malware specifically tailored to run on Apple's M1 chip has been discovered, indicating that malware authors have begun adapting malicious software for Apple's new generation of Macs with Apple silicon.
![]()
Mac security researcher Patrick Wardle has now published a report, cited by Wired, that explains in detail how malware has started to be adapted and recompiled to run natively on the M1 chip.
Wardle discovered the first known native M1 malware in the form of a Safari adware extension, originally written to run on Intel x86 chips. The malicious extension, called "GoSearch22," is a well-known member of the "Pirrit" Mac adware family and was first spotted at the end of December. Pirrit is one of the oldest and most active Mac adware families, and has been known to constantly change in an attempt to evade detection, so it is unsurprising that it has already begun adapting for the M1.
The GoSearch22 adware presents itself as a legitimate Safari browser extension, but collects user data and serves a large number of ads such as banners and popups, including some that link to malicious websites to proliferate more malware. Wardle says the adware was signed with an Apple Developer ID in November to further conceal its malicious content, but it has since been revoked.
Wardle notes that since malware for the M1 is still at an early stage, antivirus scanners are not detecting it as easily as x86 versions and defensive tools like antivirus engines are struggling to process the amended files. The signatures used to detect threats from malware on the M1 chip have not yet been substantially observed, so the security tools to detect and deal with it are not yet available.
Researchers from security company Red Canary told Wired that other types of native M1 malware, distinct from Wardle's findings, have also been found and are being investigated.
Only the MacBook Pro, MacBook Air, and Mac mini have Apple silicon chips at this time, but the technology is expected to expand across the Mac lineup over the next two years. Given that all new Mac computers are expected to feature Apple silicon chips like the M1 in the near future, it was somewhat inevitable that malware developers would eventually start to target Apple's new machines.
While the M1-native malware that researchers have found does not seem to be unusual or particularly dangerous, the emergence of these new varieties acts as a warning that there is likely more to come.
See Wardle's full report for more information about the first M1-native malware.
Article Link: First Malware Running Natively on M1 Chip Discovered
I have a real job unlike these people.At least they make money from doing this. What money did you make with this statement?
Sometimes that doesn't matter. You can browse a completely legitimate website and get malware from a malicious ad on it. I don't like to ad-block when I can (which is why I pay Macrumors for the ad-free experience). But it is really becoming a necessity to even be secure.Or just be careful what you install. Don’t be like my mother and click every pop up that appears
I don't think that is what the poster meant by "opening up".The best way to make something such as software secure is to open it up, such that a community can identify, report and fix the vulnerability. macOS is built on FreeBSD lite which is open source code and with the support of the open source community we have come along way. Compare this to Windows.
Apple clearly sees the value in it hence it has a bug bounty.
Careful. Sometimes there are open source software that comes highly recommended in the tech industry that have pages with dozens of download now buttons. Sometimes it is tricky knowing which of the 12 is the correct "Download" button you should click.There are a lot of dumb users who click on prompts without reading them first. I don’t have an antivirus actively running on my Mac, and it doesn’t get infected.
I guess you never been subject to malicious ads before. Or a simple typo when going to a URL. I wanted to install Filezilla a few years ago and one typo in the URL caused major issues for me. And I did not download a thing, but there are security exploits that don't always require user interaction.There is so much unnecessary panic in these threads. Computer security is a cat and mouse game and there’s no such thing as a 100% secure system.
Apple has a check that runs before you boot into the OS that checks against known malware and disables it, it’s called XProtect. Those security updates that come out also update XProtect.
Theres always a chance you’re one of the first to catch something but that’s where common sense computing (like don’t randomly install crap you know nothing about) come into play.
I think you misconstrued my use of "popular" with "better."The definition of “popular” is a far stretch. Windows is simply easily available may it be via OEM or individual purchased license unlike macOS other than having the technical know how to install it on a hackintosh with limited driver support, Windows can be obtained via questionable sources and can be run on most affordable hardware via a sum of its parts or a package which Can be done with Mac to a very very limited and deep pocket degree.
If the playing field was levelled it may tell a different story.
Very true. Usually from those websites loaded with ads.Careful. Sometimes there are open source software that comes highly recommended in the tech industry that have pages with dozens of download now buttons. Sometimes it is tricky knowing which of the 12 is the correct "Download" button you should click.
It's a Safari extension that you need to install manually. The only difference to a "normal" extension is that it was written by someone with malicious intent. No vulnerability needed.ARM architecture isn't new and doesn't automatically make it safe. The vulnerability is MacOS on ARM is new so buggy that it'll be target of vulnerability attacks.
Faster running malware, duh 😂Question 1: Was there an x86 version of the malware?
Question 2: If yes, did the x86 version run using Rosetta?
Question 3: If yes, does having an ARM version make any difference?
It's not an exploit, they just made malware that's installed through a known attack vector. Anyone can do it.Most likely for community bragging rights. Sometimes these types of exploits either created or found leads to employment opportunities. It’s not all for nothing.
Professionals have standards! Don't want that malware to be unoptimized. (jk)Question 1: Was there an x86 version of the malware?
Question 2: If yes, did the x86 version run using Rosetta?
Question 3: If yes, does having an ARM version make any difference?
Yes but for other reasons, that you can't get a good ad-blocker on Safari, and ad-blocking is key to not getting assaulted by random websites.Don't use Safari!
And good to know that the malware won't make the fans kick in!And the malware runs about 1.5X faster than on rosetta 2!