Articles tagged "Apple"

Found 23 articles

Actively Exploited

The latest Security Affairs Malware newsletter covers several significant malware threats that have emerged recently. Notably, a group identified as Stan Ghouls is targeting users in Russia and Uzbekistan using the NetSupport Remote Access Trojan (RAT), which allows attackers to control infected systems remotely. Another concerning development is the discovery of ZeroDayRAT, a new spyware designed to infiltrate both Android and iOS devices. Additionally, researchers have uncovered a Linux botnet named SSHStalker, which utilizes old-school IRC methods to compromise new victims. These activities demonstrate the evolving tactics of cybercriminals and emphasize the need for users and organizations to remain vigilant against these persistent threats.

Impact: NetSupport RAT, ZeroDayRAT (Android and iOS), SSHStalker Linux Botnet
Remediation: Users should implement security updates, monitor network activity for unusual behavior, and utilize endpoint protection solutions to mitigate these threats.
Read Original
Actively Exploited

Apple has addressed a serious zero-day vulnerability, identified as CVE-2026-20700, which was used in targeted attacks last year. This flaw, a memory corruption issue in the dyld component of Apple's operating systems, could allow attackers to execute arbitrary code on affected devices. Specifically, the vulnerability impacts versions of iOS prior to iOS 26 and was reportedly exploited in sophisticated attacks against select individuals. Users of these older versions should update their devices to protect against potential exploitation.

Impact: Affected products include Apple's iOS versions prior to iOS 26, particularly those using the dyld component.
Remediation: Users are advised to update their devices to the latest version of iOS to mitigate the vulnerabilities associated with CVE-2026-20700.
Read Original

A North Korea-associated hacking group known as UNC1069 is targeting cryptocurrency organizations to steal sensitive information from both Windows and macOS systems. Their approach involves social engineering tactics, including the use of a compromised Telegram account to set up a fake Zoom meeting. This deception leads victims to download malware through a method called ClickFix, which researchers believe may also utilize AI-generated content to enhance its effectiveness. The implications of these attacks are significant, as they not only threaten the financial security of targeted companies but also highlight the evolving tactics used by cybercriminals in the cryptocurrency sector. Protecting against such sophisticated schemes is increasingly critical for organizations in this space.

Impact: Windows and macOS systems, cryptocurrency organizations
Remediation: Organizations should implement strong security protocols, educate employees about social engineering tactics, and monitor communications for suspicious activity.
Read Original

Researchers have identified a new spyware kit called ZeroDayRAT, which is being distributed via Telegram. This toolkit is said to allow attackers to fully compromise both iOS and Android devices, functioning at a level typically associated with resources available to nation-states. The implications of this spyware are significant, as it can potentially give hackers complete access to personal data and device controls. Users of mobile devices, especially those who may be targeted for sensitive information, should be particularly cautious. The emergence of such advanced tools raises serious concerns about mobile security and privacy.

Impact: iOS and Android devices
Remediation: Users should ensure their devices are updated with the latest security patches and be cautious about downloading unknown apps or clicking on suspicious links.
Read Original

Recent testing has shown that the speaker in Apple's AirTags can be easily disabled using a common tool, like a spudger, in less than two minutes. This raises significant privacy concerns, as disabling the speaker could prevent users from hearing alerts that the device is tracking them. This situation is particularly alarming for individuals who might be targeted for unwanted tracking or stalking, as it could allow malicious actors to exploit the AirTags without detection. While Apple has marketed these devices as a way to help users locate lost items, this vulnerability could undermine their intended purpose. Users and privacy advocates are urging Apple to address this issue to enhance the security features of the product.

Impact: Apple AirTag
Remediation: Apple should consider implementing design changes to prevent the speaker from being easily disabled.
Read Original

Lockdown Mode is a security feature for iPhones designed to protect users from cyber attacks and prevent forensic tools from accessing data after a device is seized by authorities. This mode is particularly useful for individuals who may be at risk of targeted attacks, such as journalists, activists, or those in sensitive positions. By activating Lockdown Mode, users enhance their privacy and security, making it significantly harder for anyone to extract information from their devices. The feature gained attention after reportedly thwarting attempts by law enforcement, including the FBI, to access iPhones during investigations. This highlights the ongoing battle between personal privacy and law enforcement access to digital data, raising important questions about the balance between security and individual rights.

Impact: iPhone devices with iOS updates that support Lockdown Mode
Remediation: To enable Lockdown Mode, go to Settings > Privacy & Security > Lockdown Mode and follow the prompts to activate it.
Read Original

In a recent examination of the new AirTag 2, a notable security vulnerability was discovered. An individual was able to disable the device's speaker in just two minutes using a single tool. This is significant because the speaker is essential for alerting users to the AirTag's location, which could lead to unauthorized tracking or tampering. If an attacker can easily silence the AirTag, it undermines its primary function of helping users locate lost items. This flaw raises concerns for anyone who relies on the AirTag for tracking personal belongings, as it may create opportunities for misuse. Apple's tracking devices are popular among consumers, and this discovery could lead to increased scrutiny of their security features.

Impact: AirTag 2
Remediation: Users should be cautious and consider additional security measures when using AirTag devices. No specific patches or updates have been mentioned.
Read Original

A new strain of malware known as GlassWorm has been found targeting macOS systems through compromised OpenVSX extensions. This malware aims to steal sensitive information, including passwords, cryptocurrency wallet data, and developer credentials. Users who have installed these extensions may be at risk, highlighting a significant security issue for developers and crypto users on macOS. Researchers emphasize the importance of vigilance when installing third-party extensions and recommend that users ensure their software is up-to-date. This incident underscores the need for better security practices in the software development ecosystem to prevent such attacks.

Impact: macOS systems, OpenVSX extensions
Remediation: Users should uninstall any suspicious OpenVSX extensions and ensure their macOS and software are updated to the latest versions. Regularly changing passwords and using two-factor authentication where possible is also advised.
Read Original

North Korean hackers are targeting macOS developers by luring them to malicious projects on GitHub and GitLab that are opened with Visual Studio Code. The attackers use these repositories to trick users into executing harmful code, potentially compromising their systems. This tactic poses a significant risk to developers who may unknowingly download and run these malicious projects, which could lead to data breaches or further exploitation of their systems. As these attacks exploit popular development tools, developers need to be vigilant about the sources of the projects they access. This incident emphasizes the ongoing threat posed by state-sponsored hackers and the need for heightened awareness in the software development community.

Impact: macOS systems, Visual Studio Code, GitHub, GitLab
Remediation: Developers should verify the integrity and source of any repositories before downloading or executing code. Keeping software updated and utilizing security tools to scan for malicious code are also recommended.
Read Original
RansomHouse Claims Data Breach at Major Apple Contractor Luxshare

Hackread – Cybersecurity News, Data Breaches, AI, and More

RansomHouse, a known cybercriminal group, claims to have breached Luxshare, a major contractor for Apple. However, as of now, there is no tangible evidence to support this claim, and the links associated with the breach are currently offline. This situation raises concerns because Luxshare plays a critical role in Apple's supply chain, and any data breach could potentially compromise sensitive information related to Apple's operations. The lack of verification means that while the claim exists, its legitimacy remains uncertain. Companies in similar sectors should remain vigilant as the situation develops, given the potential risks from such threats.

Impact: Apple's supply chain, Luxshare's systems
Remediation: N/A
Read Original

Logitech's Options+ and G Hub applications for macOS have stopped functioning due to an expired code-signing certificate. This issue means that users are unable to launch these applications on their Apple systems, impacting those who rely on them for device customization and management. The problem arose suddenly, leaving many users without access to essential features. While this isn't a security vulnerability or breach, it does highlight the importance of maintaining valid certificates for software integrity and user access. Logitech will need to address this promptly to restore functionality for affected users.

Impact: Logitech Options+, Logitech G Hub, macOS systems
Remediation: Users should check for updates from Logitech to obtain a renewed code-signing certificate or follow any instructions provided by Logitech for restoring functionality.
Read Original

A new wave of the GlassWorm malware campaign is targeting macOS developers by distributing malicious extensions for Visual Studio Code and OpenVSX. These extensions contain trojanized versions of popular cryptocurrency wallet applications, which can compromise users' sensitive information and funds. Developers who install these malicious extensions may unknowingly expose themselves and their projects to significant risks. The attack highlights the ongoing vulnerabilities within software development environments and the need for developers to be cautious about the tools and extensions they use. Users are advised to verify the authenticity of any extensions before installation, especially those related to cryptocurrency.

Impact: macOS, Visual Studio Code, OpenVSX, crypto wallet applications
Remediation: Users should verify the source of extensions before installation and avoid using untrusted or unofficial versions of crypto wallet applications.
Read Original

A new version of the MacSync Stealer malware has been discovered, which poses a serious risk to macOS users. Unlike earlier versions, this malware can execute without requiring user interaction with the terminal, making it easier for attackers to infect systems. The malware is reportedly distributed through a signed Swift application, which could mislead users into thinking it's legitimate software. This change in the malware's operation means that even less tech-savvy users could fall victim to it, potentially leading to unauthorized access to sensitive information. Users of macOS should be particularly cautious about the applications they install and ensure they come from trusted sources.

Impact: macOS users, applications distributed via signed Swift applications
Remediation: Users should only install software from trusted sources, regularly update their systems, and consider using antivirus solutions that can detect malware.
Read Original
Insider Threat: Hackers Paying Company Insiders to Bypass Security

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

A recent report from Check Point Research reveals a troubling trend of cyber criminals targeting company insiders to gain unauthorized access to sensitive information. Hackers are using platforms like the darknet and Telegram to recruit employees from major organizations, including banks, telecom companies, and tech firms. They are reportedly offering payments of up to $15,000 for insider access to companies such as Apple, Coinbase, and the Federal Reserve. This practice raises significant security concerns, as it can lead to data breaches and financial losses for these organizations. Companies must be vigilant about insider threats and implement stronger security measures to protect against this growing risk.

Impact: Apple, Coinbase, Federal Reserve, various banks, telecoms, tech giants
Remediation: Companies should enhance insider threat programs, conduct regular security training for employees, and monitor for unusual activity within their networks.
Read Original

Apple has released security updates to address two vulnerabilities in WebKit, identified as CVE-2025-14174 and CVE-2025-43529, which are currently being exploited in the wild. The first vulnerability, CVE-2025-14174, was previously patched by Google for its Chrome desktop browser, but details were limited at that time. This flaw allows for out-of-bounds memory access, potentially enabling attackers to execute arbitrary code. Users of Apple devices, particularly those running Safari or any applications reliant on WebKit, should prioritize updating their systems to safeguard against these vulnerabilities. Ignoring these updates could leave devices exposed to active exploitation.

Impact: Affected products include Apple devices running Safari and any applications using WebKit. Specific versions or models are not detailed, but all users of Apple's operating systems should be cautious.
Remediation: Users should update their Apple devices to the latest version of the operating system to apply the security patches addressing CVE-2025-14174 and CVE-2025-43529.
Read Original
Page 1 of 2Next