Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
In August of 2020, Trend Micro researchers spotted malware that spread through the Xcode projects and targeted systems to steal sensitive information and launch ransomware attacks. Applications like Evernote, QQ, skype, WeChat, Notes, and Telegram were infected by the malware. The malware allowed attackers to exfiltrate stolen documents from targeted systems and capture screenshots. It was also able to implement ransomware behavior by encrypting files and displaying ransomware notes.
The malware was also able to launch UXSS (universal cross-site scripting) attacks to inject JavaScript code into browsers while visiting specific websites and impacting user’s browsing experience. This allowed the malware to replace cryptocurrency addresses with malicious codes. Credentials of online services like Apple ID, Paypal, Google, and Yandex and payment card information from Apple were stolen.
While Trend Micro discovered two Xcode projects injected with the XCSSET Mac Malware in 2020, Kaspersky has discovered a new variant of the malware compiled for devices with M1 chips.
“While exploring the various executable modules of XCSSET, we found out that some of them also contained samples compiled specially for new Apple Silicon chips. For example, a sample with the MD5 hash sum 914e49921c19fffd7443deee6ee161a4 contains two architectures: x86_64 and ARM64.” states the report published by Kaspersky.
“The first one corresponds to previous-generation, Intel-based Mac computers, but the second one is compiled for ARM64 architecture, which means that it can run on computers with the new Apple M1 chip.”
The XCSSET Mac Malware now supports both x86_x64 and ARM64 architectures, and in addition to M1 chips, XCSSET malware also fits with macOS 11 Big Sur.
ARM-based M1 processors