Advertisement
UK markets close in 2 hours 11 minutes
  • FTSE 100

    8,121.64
    +42.78 (+0.53%)
     
  • FTSE 250

    19,791.46
    +189.48 (+0.97%)
     
  • AIM

    754.89
    +1.77 (+0.24%)
     
  • GBP/EUR

    1.1668
    +0.0012 (+0.10%)
     
  • GBP/USD

    1.2504
    -0.0007 (-0.06%)
     
  • Bitcoin GBP

    51,141.88
    +749.91 (+1.49%)
     
  • CMC Crypto 200

    1,385.29
    -11.25 (-0.81%)
     
  • S&P 500

    5,048.42
    -23.21 (-0.46%)
     
  • DOW

    38,085.80
    -375.12 (-0.98%)
     
  • CRUDE OIL

    84.24
    +0.67 (+0.80%)
     
  • GOLD FUTURES

    2,358.50
    +16.00 (+0.68%)
     
  • NIKKEI 225

    37,934.76
    +306.28 (+0.81%)
     
  • HANG SENG

    17,651.15
    +366.61 (+2.12%)
     
  • DAX

    18,082.21
    +164.93 (+0.92%)
     
  • CAC 40

    8,061.13
    +44.48 (+0.55%)
     

Mysterious malware discovered on 30,000 new Macs - and researchers have no idea what it was designed to do

 (Apple)
(Apple)

Security researchers have discovered a piece of malware called Silver Sparrow on 30,000 Mac computers, including those with Apple’s latest M1 chips.

The malware, discovered and documented by Malwarebytes and Red Canary, “did not exhibit the behaviors that we’ve come to expect from the usual adware that so often targets macOS systems.”

Instead, spreading across 153 countries, the malware is designed to deliver a payload that the researchers have yet not discovered.

It also has a system in place to self-destruct - hiding its existence totally.

As Ars Technica reports, infected computers check a server every hour to see if there are any new commands from malicious individuals to execute.

ADVERTISEMENT

The malware is even stranger due to the fact it uses the macOS Installer JavaScript API to execute commands, which makes it hard to analyse the contents of the package.

When the malware is executed, all that the researchers found were two messages: for computers using Intel chips, the malware displays the words “Hello World!”, while for M1 Macs it says “You did it!”

The researchers hypothesise that these are simply placeholders for a later execution.

“We’ve found that many macOS threats are distributed through malicious advertisements as single, self-contained installers in PKG or DMG form, masquerading as a legitimate application—such as Adobe Flash Player—or as updates”, the researchers describe.

Apple has already revoked the binaries that could be mean users accidentally install the malware. The malware does not seem to have delivered any malicious payload, and the company emphasises that using its own Mac App Store is the safest place to get software for its computers Mac.

For programs downloaded outside the store Apple does use technical technical mechanisms including as the Apple notary service detect and block malware.

“To me, the most notable [thing] is that it was found on almost 30K macOS endpoints... and these are only endpoints the MalwareBytes can see, so the number is likely way higher,” says Patrick Wardle, a macOS security expert, according to Ars Technica.

“That’s pretty widespread... and yet again shows the macOS malware is becoming ever more pervasive and commonplace, despite Apple’s best efforts.”

This is not the only malware discovered for the M1 Mac. Wardle also found the first instance of it last week - a worrying indication of how quickly harmful software is being developed for Macs.

The M1 Macs were developed in November last year, but many people erroneously think that Macs are inherently safer than Windows PCs.

That, unfortunately, is not true. While Windows machines still dominate market share, Apple computers have grown in popularity.

Between 2018 and 2019, there was a 400 per cent increase in Mac threats - twice the average of Windows computers.

Read More

How Apple made its new M1 chip, the latest MacBooks – and used its past to decide its future

What is M1? How Apple says its new chip will change the future of the MacBook