{"id":798073,"date":"2021-02-22T09:58:36","date_gmt":"2021-02-22T09:58:36","guid":{"rendered":"https:\/\/telecomlive.in\/web\/2021\/02\/22\/over-30000-apple-macs-have-been-infected-with-a-high-stealth-malware-and-the-company-has-no-idea-why\/"},"modified":"2021-02-22T09:58:36","modified_gmt":"2021-02-22T09:58:36","slug":"over-30000-apple-macs-have-been-infected-with-a-high-stealth-malware-and-the-company-has-no-idea-why","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2021\/02\/22\/over-30000-apple-macs-have-been-infected-with-a-high-stealth-malware-and-the-company-has-no-idea-why\/","title":{"rendered":"Over 30,000 Apple Macs have been infected with a high-stealth malware, and the company has no idea why"},"content":{"rendered":"<p>Security researchers have discovered a mysterious malware on nearly 30,000 Apple Macs and they have no idea what this is for and how is this virus going to infected the devices.<\/p>\n<p>The malware named &#8216;Silver Sparrow&#8217; comes with a mechanism to self-destruct itself, a capability that&#8217;s typically reserved for high-stealth operations.<\/p>\n<p>&#8220;So far, though, there are no signs the self-destruct feature has been used, raising the question of why the mechanism exists,&#8221; Ars Technica first reported about the presence of malware citing security researchers.<\/p>\n<p>The lack of a final payload suggests that the malware may spring into action anytime.<\/p>\n<p>The malware has been found in 153 countries with heavy detection reported in the US, the UK, Canada, France and Germany.<\/p>\n<p>Silver Sparrow is an activity cluster that includes a binary compiled to run on Apple&#8217;s new M1 chips but lacks one very important feature: a payload.<\/p>\n<p>&#8220;Though we haven&#8217;t observed Silver Sparrow delivering additional malicious payloads yet, its forward-looking M1 chip compatibility, global reach, relatively high infection rate, and operational maturity suggest Silver Sparrow is a reasonably serious threat,&#8221; according to researchers from cyber security firm Red Canary.<\/p>\n<p>The malware is uniquely positioned to deliver a potentially impactful payload at a moment&#8217;s notice.<\/p>\n<p>Silver Sparrow comes in two versions one with a binary in mach-object format compiled for Intel x86_64 processors and the other Mach-O binary for the M1.<\/p>\n<p>Researchers have earlier warned that Apple&#8217;s transition from Intel to its own silicon M1 chip may make it easy for hackers to introduce malware.<\/p>\n<p>&#8220;To me, the most notable [thing] is that it was found on almost 30K macOS endpoints&#8230; and these are only endpoints the MalwareBytes can see, so the number is likely way higher,&#8221; said Patrick Wardle, a macOS security expert.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have discovered a mysterious malware on nearly 30,000 Apple Macs and they have no idea what this is for and how is this virus going to infected the devices. The malware named &#8216;Silver Sparrow&#8217; comes with a mechanism to self-destruct itself, a capability that&#8217;s typically reserved for high-stealth operations. &#8220;So far, though, there are no signs the self-destruct feature has been used, raising the question of why the mechanism exists,&#8221; Ars Technica first reported about the presence of malware citing security researchers. The lack of a final payload suggests that the malware may spring into action anytime. The [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-798073","post","type-post","status-publish","format-standard","hentry","category-it-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/798073","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=798073"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/798073\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=798073"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=798073"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=798073"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}