Malware Devil

Friday, February 19, 2021

Kia Denies Ransomware Attack as IT Outage Continues

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon Contest

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-20588
PUBLISHED: 2021-02-19

Improper handling of length parameter inconsistency vulnerability in Mitsubishi Electric FA Engineering Software(C Controller module setting and monitoring tool all versions, CPU Module Logging Configuration Tool all versions, CW Configurator all versions, Data Transfer all versions, EZSocket all ve…

CVE-2021-26713
PUBLISHED: 2021-02-19

A stack-based buffer overflow in res_rtp_asterisk.c in Sangoma Asterisk before 16.16.1, 17.x before 17.9.2, and 18.x before 18.2.1 and Certified Asterisk before 16.8-cert6 allows an authenticated WebRTC client to cause an Asterisk crash by sending multiple hold/unhold requests in quick succession. T…

CVE-2020-35499
PUBLISHED: 2021-02-19

A NULL pointer dereference flaw in kernel versions prior to 5.11 may be seen if sco_sock_getsockopt function in net/bluetooth/sco.c do not have a sanity check for a socket connection, when using BT_SNDMTU/BT_RCVMTU for SCO sockets. This could allow a local attacker with a special user privilege to c…

CVE-2021-20587
PUBLISHED: 2021-02-19

Heap-based buffer overflow vulnerability in Mitsubishi Electric FA Engineering Software (C Controller module setting and monitoring tool all versions, CPU Module Logging Configuration Tool all versions, CW Configurator all versions, Data Transfer all versions, EZSocket all versions, FR Configurator …

CVE-2021-27214
PUBLISHED: 2021-02-19

A Server-side request forgery (SSRF) vulnerability in the ProductConfig servlet in Zoho ManageEngine ADSelfService Plus through 6013 allows a remote unauthenticated attacker to perform blind HTTP requests or perform a Cross-site scripting (XSS) attack against the administrative interface via an HTTP…

The post Kia Denies Ransomware Attack as IT Outage Continues appeared first on Malware Devil.



https://malwaredevil.com/2021/02/19/kia-denies-ransomware-attack-as-it-outage-continues/?utm_source=rss&utm_medium=rss&utm_campaign=kia-denies-ransomware-attack-as-it-outage-continues

Getting Into the Rhythm of Chart Typography with {ragg} and {hrbragg} (a.k.a. It’s {ragg}-time}

Horrible puns aside, hopefully everyone saw the news, earlier this week, from @thomasp85 on the evolution of modern typographic capabilities in the R ecosystem. Thomas (and some cohorts) has been working on {systemfonts}, {ragg}, and {textshaping} for quite a while now, and the — shall we say tidyglyphs ecosystem — is super-ready for prime time…. Continue reading

The post Getting Into the Rhythm of Chart Typography with {ragg} and {hrbragg} (a.k.a. It’s {ragg}-time} appeared first on Security Boulevard.

Read More

The post Getting Into the Rhythm of Chart Typography with {ragg} and {hrbragg} (a.k.a. It’s {ragg}-time} appeared first on Malware Devil.



https://malwaredevil.com/2021/02/19/getting-into-the-rhythm-of-chart-typography-with-ragg-and-hrbragg-a-k-a-its-ragg-time/?utm_source=rss&utm_medium=rss&utm_campaign=getting-into-the-rhythm-of-chart-typography-with-ragg-and-hrbragg-a-k-a-its-ragg-time

Malformed URL Prefix Phishing Attacks Spike 6,000%

Sneaky attackers are flipping backslashes in phishing email URLs to evade protections, researchers said.
Read More

The post Malformed URL Prefix Phishing Attacks Spike 6,000% appeared first on Malware Devil.



https://malwaredevil.com/2021/02/19/malformed-url-prefix-phishing-attacks-spike-6000/?utm_source=rss&utm_medium=rss&utm_campaign=malformed-url-prefix-phishing-attacks-spike-6000

North Korean hackers charged with $1.3 billion of cyberheists

The US Department of Justice recently unsealed indictments detailing North Korea’s involvement in several global cyberattack campaigns against institutions in the financial and entertainment sectors, and money laundering schemes in certain US states.

The first unsealed indictment is for hacking activities done by three computer programmers from North Korea. Prosecutors name Jon Chang Hyok (???; aka “Alex/Quan Jiang”), Kim Il (??; aka “Julien Kim” and “Tony Walker”), and Park Jin Hyok (???; aka “Pak Jin Hek”, “Pak Kwang Jin”, and “Jin Hyok Park”) as members of the Reconnaissance General Bureau (RGB), a military intelligence arm of the Democratic People’s Republic of Korea (DPRK) that is known for conducting clandestine operations on behalf of its country.

Park was already indicted back in Septmber 2018 for his involvement in multiple destructive cybercrime attacks, which includes the creation of WannaCry that made headlines in 2017, the Bangladesh Bank cyber heist in 2016, and the attack on Sony Pictures Entertainment (SPE) in 2015.

According to the Justice Department, the RGB is known by many names in the cybersecurity industry, such as the Lazarus Group and Advanced Persistent Threat 38 (APT38). Other crimes the three North Koreans are charged with include: attempting to hack banks’ networks and sending falsified SWIFT messages; the theft of millions of US dollars worth of cryptocurrency from cryptocurrency companies; conducting ATM cash-out (aka FASTcash) and spear phishing schemes; deploying multiple malicious cryptocurrency applications; and the creation and marketing of the Marine Chain Token, an attempt to gain funds and evade US sanctions. A charge was also unsealed against Ghaleb Alaumary, a Canadian-American described by the FBI as a “prolific money launderer”.

While Jon, Kim, and Park are based in North Korea, their government has stationed them in other countries like Russia and China, the report further claims.

North Korean actors have not only heavily targeted the financial sector but also several cybersecurity professionals. Jerome Segura, director of threat intelligence at Malwarebytes details, “In one of the most recent campaigns, Lazarus APT has targeted vulnerability researchers and exploit developers to steal new exploits as well as any additional tools they may be able to use in the future. This campaign has been conducted to broaden their capabilities in using zero days in their future attacks.”

“The scope of the criminal conduct by the North Korean hackers was extensive and long-running, and the range of crimes they have committed is staggering,” the report quotes Acting US Attorney for the Central District of California Tracy L. Wilkinson. “The conduct detailed in the indictment are the acts of a criminal nation-state that has stopped at nothing to extract revenge and obtain money to prop up its regime.”

Alaumary is already in custody while Jon, Kim, and Park remain at large.

A copy of the indictment in PDF can be downloaded here.

The post North Korean hackers charged with $1.3 billion of cyberheists appeared first on Malware Devil.



https://malwaredevil.com/2021/02/19/north-korean-hackers-charged-with-1-3-billion-of-cyberheists-2/?utm_source=rss&utm_medium=rss&utm_campaign=north-korean-hackers-charged-with-1-3-billion-of-cyberheists-2

Mysterious Silver Sparrow Malware Found Nesting on 30K Macs

A second malware that targets Macs with Apple’s in-house M1 chip is infecting machines worldwide — but it’s unclear why.
Read More

The post Mysterious Silver Sparrow Malware Found Nesting on 30K Macs appeared first on Malware Devil.



https://malwaredevil.com/2021/02/19/mysterious-silver-sparrow-malware-found-nesting-on-30k-macs-2/?utm_source=rss&utm_medium=rss&utm_campaign=mysterious-silver-sparrow-malware-found-nesting-on-30k-macs-2

Mysterious Silver Sparrow Malware Found Nesting on 30K Macs

A second malware that targets Macs with Apple’s in-house M1 chip is infecting machines worldwide — but it’s unclear why.
Read More

The post Mysterious Silver Sparrow Malware Found Nesting on 30K Macs appeared first on Malware Devil.



https://malwaredevil.com/2021/02/19/mysterious-silver-sparrow-malware-found-nesting-on-30k-macs/?utm_source=rss&utm_medium=rss&utm_campaign=mysterious-silver-sparrow-malware-found-nesting-on-30k-macs

Credential-Stuffing Attack Targets Regional Internet Registry

RIPE NCC, the regional Internet registry for Europe, West Asia, and the former Soviet Union, said attackers attempted a credential-stuffing attack against its single-sign on service.
Read More

The post Credential-Stuffing Attack Targets Regional Internet Registry appeared first on Malware Devil.



https://malwaredevil.com/2021/02/19/credential-stuffing-attack-targets-regional-internet-registry/?utm_source=rss&utm_medium=rss&utm_campaign=credential-stuffing-attack-targets-regional-internet-registry

North Korean hackers charged with $1.3 billion of cyberheists

The US Department of Justice recently unsealed indictments detailing North Korea’s involvement in several global cyberattack campaigns against institutions in the financial and entertainment sectors, and money laundering schemes in certain US states.

The first unsealed indictment is for hacking activities done by three computer programmers from North Korea. Prosecutors name Jon Chang Hyok (전창혁; aka “Alex/Quan Jiang”), Kim Il (김일; aka “Julien Kim” and “Tony Walker”), and Park Jin Hyok (박진혁; aka “Pak Jin Hek”, “Pak Kwang Jin”, and “Jin Hyok Park”) as members of the Reconnaissance General Bureau (RGB), a military intelligence arm of the Democratic People’s Republic of Korea (DPRK) that is known for conducting clandestine operations on behalf of its country.

Park was already indicted back in Septmber 2018 for his involvement in multiple destructive cybercrime attacks, which includes the creation of WannaCry that made headlines in 2017, the Bangladesh Bank cyber heist in 2016, and the attack on Sony Pictures Entertainment (SPE) in 2015.

According to the Justice Department, the RGB is known by many names in the cybersecurity industry, such as the Lazarus Group and Advanced Persistent Threat 38 (APT38). Other crimes the three North Koreans are charged with include: attempting to hack banks’ networks and sending falsified SWIFT messages; the theft of millions of US dollars worth of cryptocurrency from cryptocurrency companies; conducting ATM cash-out (aka FASTcash) and spear phishing schemes; deploying multiple malicious cryptocurrency applications; and the creation and marketing of the Marine Chain Token, an attempt to gain funds and evade US sanctions. A charge was also unsealed against Ghaleb Alaumary, a Canadian-American described by the FBI as a “prolific money launderer”.

While Jon, Kim, and Park are based in North Korea, their government has stationed them in other countries like Russia and China, the report further claims.

North Korean actors have not only heavily targeted the financial sector but also several cybersecurity professionals. Jérôme Segura, director of threat intelligence at Malwarebytes details, “In one of the most recent campaigns, Lazarus APT has targeted vulnerability researchers and exploit developers to steal new exploits as well as any additional tools they may be able to use in the future. This campaign has been conducted to broaden their capabilities in using zero days in their future attacks.”

“The scope of the criminal conduct by the North Korean hackers was extensive and long-running, and the range of crimes they have committed is staggering,” the report quotes Acting US Attorney for the Central District of California Tracy L. Wilkinson. “The conduct detailed in the indictment are the acts of a criminal nation-state that has stopped at nothing to extract revenge and obtain money to prop up its regime.”

Alaumary is already in custody while Jon, Kim, and Park remain at large.

A copy of the indictment in PDF can be downloaded here.

The post North Korean hackers charged with $1.3 billion of cyberheists appeared first on Malwarebytes Labs.

The post North Korean hackers charged with $1.3 billion of cyberheists appeared first on Malware Devil.



https://malwaredevil.com/2021/02/19/north-korean-hackers-charged-with-1-3-billion-of-cyberheists/?utm_source=rss&utm_medium=rss&utm_campaign=north-korean-hackers-charged-with-1-3-billion-of-cyberheists

BSidesSF 2020 – Brianne Hughes’ ‘How To Write Like It’s Your Job’

Our thanks to BSidesSF and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSidesSF 2020 Conference, and on the Organization’s YouTube Channel. Additionally, the BSidesSF 2021 Conference will take place on March 6 – 9, 2021 – with no cost to participate. Enjoy!

Permalink

The post BSidesSF 2020 – Brianne Hughes’ ‘How To Write Like It’s Your Job’ appeared first on Security Boulevard.

Read More

The post BSidesSF 2020 – Brianne Hughes’ ‘How To Write Like It’s Your Job’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/19/bsidessf-2020-brianne-hughes-how-to-write-like-its-your-job/?utm_source=rss&utm_medium=rss&utm_campaign=bsidessf-2020-brianne-hughes-how-to-write-like-its-your-job

Attackers Already Targeting Apple’s M1 Chip with Custom Malware

A proof-of-concept program infects systems with ARM64-compiled binaries and then reaches out to download additional functionality.

The latest processor for Apple’s Macs — the M1 chip — has already become a target for malware authors, who have created Mac-specific binaries targeting the ARM64 architecture used by the processors, researchers said this week.

For example, one MacOS malware downloader, dubbed Silver Sparrow, has a number of interesting properties, including the use of the MacOS installer’s JavaScript API to create persistence, and communication with a command-and-control (C2) infrastructure built on Amazon Web Services (AWS) servers and Akamai’s content distribution network (CDN), security firm Red Canary stated in an analysis of the new malware. In addition, the malware also natively runs on the latest Macs running the M1 ARM64 architecture.

While creating a native binary for the ARM64 architecture is an interesting step on the part of attackers, the development merely allows the malware to run a bit faster and may avoid some x86-focused security measures, says Tony Lambert, intelligence analyst at Red Canary.

“This threat didn’t take advantage of any particular feature unique to M1 itself,” he says, but adds that “the malware has a greater chance of success on M1 systems due to the [relative lack of] availability of security tools for the new architecture.”

Attackers have traditionally focused on Mac systems as an afterthought, since Windows-based computers have historically dominated business applications. However, that has changed over the past decade, with nation-state attackers and more sophisticated hackers focusing on Mac systems, and cybercriminals attempting to focus on legal gray areas, such as adware. In 2020, for example, almost all malware encountered by Mac users was adware or potentially unwanted programs (PUPs), not malware.

In the case of Silver Sparrow, the creation of an M1-specific binary is merely a point of interest, says Lambert. The malware platform does not currently have any subsequent stage, so its hourly attempts to contact the operator’s C2 infrastructure does not result in the installation of additional features or functions, according to Red Canary.

Yet, while tailoring the code to the M1 chip requires little effort on the part of the malware authors — just compiling the code on an M1 Mac will do — the fact that someone has done so indicates that attackers are looking to the future. In addition, security firms could be behind the curve, says Lambert.

“Since the architecture changed, software developers need to recompile their products and test for the new systems,” he says. “As a result, some security vendors haven’t fully caught up to the technology change.”

Non-native ARM64 programs use an Apple technology known as Rosetta to run on M1-based Macs. Because the malware does not have to go through the Rosetta system for backward compatibility, it could avoid detection.

Independent researcher Patrick Wardle searched the malware repository VirusTotal for information on recent binaries and found at least one program that appears to be a malicious M1 executable. Malicious M1 programs appear to evade detection by current antivirus systems, he stated in an analysis.

“[M]ore worrisomely, [static] analysis tools or anti-virus engines may struggle with ARM64 binaries,” he wrote. “Unfortunately detections of the arm64 version dropped roughly 15%–when compared to the standalone x86_64 version–[and] several industry leading AV engines, who readily detected the x86_64 version, failed to flag the malicious ARM64 binary.”

Another anti-detection approach: The Silver Sparrow malware also uses the JavaScript API to automate installation and persistence, something researchers have not seen in Mac malware in the past and that security software might miss, Red Canary’s Lambert says.

“If defenders have detection analytics written to look for malicious pre-install or post-install scripts — one usual route taken by malicious installers — using the JavaScript API to invoke commands will evade those detection analytics because it produces a different pattern in telemetry,” Lambert says. “In this case, using JavaScript causes the legitimate macOS installer process to invoke the commands without indicating the precise source within the installer package.”

Red Canary and other security firms notified Apple and Amazon of the issues, and both companies have taken steps to blunt the impact of Silver Sparrow. Apple has revoked the specific developer IDs used to create the malware, and Amazon has worked to prevent access to the specific S3 buckets used by the malware infrastructure.

“Thankfully, that risk is decreasing due to the response of Apple and Amazon … they both have internal processes to investigate and remove malicious use of their systems,” Lambert says. “That said, it’s still possible that versions of Silver Sparrow exist in the wild that no vendors have observed and that use different S3 instances or callback domains. Those users would definitely be at risk.”

While a non-M1 version of the C2 infrastructure appeared in mid-August, the malware infrastructure was updated in December with the M1 download domains in December. The actual programs have both been submitted to VirusTotal in the last month.

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT’s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post Attackers Already Targeting Apple’s M1 Chip with Custom Malware appeared first on Malware Devil.



https://malwaredevil.com/2021/02/19/attackers-already-targeting-apples-m1-chip-with-custom-malware/?utm_source=rss&utm_medium=rss&utm_campaign=attackers-already-targeting-apples-m1-chip-with-custom-malware

XKCD ‘Animal Songs’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Animal Songs’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Animal Songs’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/19/xkcd-animal-songs/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-animal-songs

Thursday, February 18, 2021

CrowdStrike Buys Log Management Startup Humio for $400M

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon Contest

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-26712
PUBLISHED: 2021-02-18

Incorrect access controls in res_srtp.c in Sangoma Asterisk 13.38.1, 16.16.0, 17.9.1, and 18.2.0 and Certified Asterisk 16.8-cert5 allow a remote unauthenticated attacker to prematurely terminate secure calls by replaying SRTP packets.

CVE-2021-26747
PUBLISHED: 2021-02-18

Netis WF2780 2.3.40404 and WF2411 1.1.29629 devices allow Shell Metacharacter Injection into the ping command, leading to remote code execution.

CVE-2020-35591
PUBLISHED: 2021-02-18

Pi-hole 5.0, 5.1, and 5.1.1 allows Session Fixation. The application does not generate a new session cookie after the user is logged in. A malicious user is able to create a new session cookie value and inject it to a victim. After the victim logs in, the injected cookie becomes valid, giving the at…

CVE-2020-35592
PUBLISHED: 2021-02-18

Pi-hole 5.0, 5.1, and 5.1.1 allows XSS via the Options header to the admin/ URI. A remote user is able to inject arbitrary web script or HTML due to incorrect sanitization of user-supplied data and achieve a Reflected Cross-Site Scripting attack against other users and steal the session cookie.

CVE-2020-35776
PUBLISHED: 2021-02-18

A buffer overflow in res_pjsip_diversion.c in Sangoma Asterisk versions 13.38.1, 16.15.1, 17.9.1, and 18.1.1 allows remote attacker to crash Asterisk by deliberately misusing SIP 181 responses.

The post CrowdStrike Buys Log Management Startup Humio for $400M appeared first on Malware Devil.



https://malwaredevil.com/2021/02/18/crowdstrike-buys-log-management-startup-humio-for-400m-2/?utm_source=rss&utm_medium=rss&utm_campaign=crowdstrike-buys-log-management-startup-humio-for-400m-2

CrowdStrike Buys Log Management Startup Humio for $400M

CrowdStrike plans to use Humio’s technology to continue building out its extended detection and response platform.

The post CrowdStrike Buys Log Management Startup Humio for $400M appeared first on Malware Devil.



https://malwaredevil.com/2021/02/18/crowdstrike-buys-log-management-startup-humio-for-400m/?utm_source=rss&utm_medium=rss&utm_campaign=crowdstrike-buys-log-management-startup-humio-for-400m

Un año de resiliencia con espíritu latino.

manageengine20

Si bien la historia de la humanidad está plagada de años difíciles, el 2020 nos presentó desafíos únicos debido a una pandemia que nos dejó muchas lecciones. Especialmente en Latinoamérica una región donde el espíritu de supervivencia prevaleció y muchas …

The post Un año de resiliencia con espíritu latino. appeared first on ManageEngine Blog.

The post Un año de resiliencia con espíritu latino. appeared first on Security Boulevard.

Read More

The post Un año de resiliencia con espíritu latino. appeared first on Malware Devil.



https://malwaredevil.com/2021/02/18/un-ano-de-resiliencia-con-espiritu-latino/?utm_source=rss&utm_medium=rss&utm_campaign=un-ano-de-resiliencia-con-espiritu-latino

Cybercriminal Enterprise ‘Ringleaders’ Stole $55M Via COVID-19 Fraud, Romance Scams

The Department of Justice (DoJ) cracked down on a Ghana-based cybercriminal enterprise behind a slew of romance scams, COVID-19 fraud attacks and business email compromise schemes since 2013.
Read More

The post Cybercriminal Enterprise ‘Ringleaders’ Stole $55M Via COVID-19 Fraud, Romance Scams appeared first on Malware Devil.



https://malwaredevil.com/2021/02/18/cybercriminal-enterprise-ringleaders-stole-55m-via-covid-19-fraud-romance-scams/?utm_source=rss&utm_medium=rss&utm_campaign=cybercriminal-enterprise-ringleaders-stole-55m-via-covid-19-fraud-romance-scams

Apple Outlines 2021 Security, Privacy Roadmap

Latest Apple Platform Security update folds iOS, macOS and hardware into security 2021 roadmap.
Read More

The post Apple Outlines 2021 Security, Privacy Roadmap appeared first on Malware Devil.



https://malwaredevil.com/2021/02/18/apple-outlines-2021-security-privacy-roadmap/?utm_source=rss&utm_medium=rss&utm_campaign=apple-outlines-2021-security-privacy-roadmap

Apple Offers Closer Look at Its Platform Security Technologies, Features

In a nearly 200-page document, company offers a detailed overview of Secure Enclave and multiple other security controls in Apple silicon-based Macs and other platforms.

The post Apple Offers Closer Look at Its Platform Security Technologies, Features appeared first on Malware Devil.



https://malwaredevil.com/2021/02/18/apple-offers-closer-look-at-its-platform-security-technologies-features-2/?utm_source=rss&utm_medium=rss&utm_campaign=apple-offers-closer-look-at-its-platform-security-technologies-features-2

Apple Offers Closer Look at Its Platform Security Technologies, Features

In a nearly 200-page document, company offers a detailed overview of Secure Enclave and multiple other security controls in Apple silicon-based Macs and other platforms.

In a rare move, Apple has decided to give IT professionals and researchers a closer look at the security features and technologies integrated into its various hardware platforms. It’s doing so in response to requests for the information from within the community.

The latest version of Apple Platform Security — a document that Apple publishes with every major software release — contains new information on nearly one dozen platform security features and additional data on 15 other security topics that the company has covered in its previous documentation.

A lot of the new information in the latest guide is focused on the security capabilities of Mac laptops and desktops running Apple silicon, which the company began shipping last November. The guide offers a detailed look at the security capabilities enabled on them via Apple’s line of new in-house, ARM-based processors. The guide also has more fleshed-out descriptions of core security technologies, like Secure Enclave system-on-a-chip for managing and protecting encryption keys.

According to a company spokesman, the document moves the needle in terms of addressing requests from researchers and defenders for more details on Apple security technologies and features. It sheds light on Apple’s philosophy and approach to platform security and why it takes the measures it does to secure its platforms.

In releasing the data, Apple says it wants to give researchers who are taking apart and scrutinizing its security mechanisms a better idea of what the systems are designed to do and how they operate. According to the spokesman, the greater detail in the current report is the outcome constant dialogue with the researcher community and Apple being responsive to their feedback.

At 196 pages, Apple’s platform security guide, released today, surpasses the 157-page tome it published in April 2020 to coincide with its last major OS release. The latest guide contains updated information for iOS 14.3, iPadOS 14.3, macOS 11.1, tvOS 14.3, and watchOS 7.2.

Like previous platform security guides, the new one is organized into multiple sections, including hardware security and biometrics, app security, system security, encryption and data protection, and services security.

Topics that have been added include a section on the boot process and boot modes for a Mac running Apple’s M1 chip, and another on how startup disk security policy control on a Mac with Apple silicon is different from an Intel-processor based Mac. The sections provide a detailed technical description of the different processes involved in each instance and how they help protect the device from compromise.

Updated Details on Security Enclave, Other Controls
With its new guide, Apple has also updated existing information on several of its key platform security technologies and features. The most significant of these updates involves its highly touted Secure Enclave, a hardware feature present in iPhones, iPads, and other Apple platforms, including — beginning recently — on Macs containing Apple’s T1 or T2 chips. Compared to details on the technology in Apple’s last platform security guide last April, the latest documentation on Secure Enclave goes into significantly greater on the processor, memory protection engine, boot ROM, boot monitor, and other aspects.

Other topics that have been updated in Apple’s new platform security guide release include kernel extensions in macOS, controls for systems integrity protection, and direct memory access protections for Macs.

Apple’s decision to disclose more details on its platform security mechanisms comes amid signs of growing attacker interest in its platforms. Just this week, for instance, an independent security researcher disclosed details of malware he discovered targeting systems running Apple’s new M1 chip. In addtion, in a report earlier this week, Malwarebytes said it had observed a drop in Windows threats directed at enterprise targets in 2020, even as Mac malware detections went up 31%.

What’s more, earlier this month, researchers from Kaspersky disclosed three vulnerabilities in iOS and related technologies that could be used to target iPhones and iPads. And last month, Apple had to push out an update to address three zero-day iOS flaws that it reported as being abused in the wild by adversaries.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Apple Offers Closer Look at Its Platform Security Technologies, Features appeared first on Malware Devil.



https://malwaredevil.com/2021/02/18/apple-offers-closer-look-at-its-platform-security-technologies-features/?utm_source=rss&utm_medium=rss&utm_campaign=apple-offers-closer-look-at-its-platform-security-technologies-features

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...