I apologize for suggesting Malwarebytes might be stealing code.
It’s probably beyond their technical expertise to do something like that. As far as I can tell, they didn’t even think that “real time protection” should protect their own app form being altered. The malware added to it was still there after a restart and a scan.
About the hacking incident, even if the doorman at the company was responsible by inserting an USB drive found on the street into the internal network, it still doesn’t look good for a company that describes itself as “Cybersecurity for Home and Business” to be hacked and don’t realize they have been hacked. In this case, probably the hackers didn’t find anything worth stealing.
About Apple’s protection, that malware was first uploaded to virustotal on 26 June 2020
https://www.virustotal.com/gui/file...4a7fec9f60f257cd0b1ab0f698ba2a5baca6b/details
(No, you can not download the malware from the link)
I was able to get past that Gatekeeper message in the video from post
29 by simply unpacking and repacking the pkg file (pkgutil --expand/pkgutil --flatten).
And in this video, a security researcher explains how malware authors got past XProtect by simply adding two spaces in their script
Code:
https://youtu.be/cAl7epCq0q4?t=2323
So far this year, Apple has patched “actively exploited” vulnerabilities four times
March 31, 2022
https://support.apple.com/en-us/HT213220
February 10, 2022
https://support.apple.com/en-us/HT213091
January 26, 2022
https://support.apple.com/en-us/HT213054
August 17, 2022
https://support.apple.com/en-us/HT213413
(I hope I didn’t miss any)
As a Big Sur user, I wonder if the Kernel vulnerability fixed in Monterey 12.5.1 is present in Big Sur and Apple left me vulnerable again. As it did from March to May
https://forums.macrumors.com/threads/security-updates.2352472/post-31283868