Thursday, April 22, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Apple notarizes six malicious apps posing as Flash installers

October 24, 2020
in Internet Security
Apple notarizes six malicious apps posing as Flash installers
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Image: Maria Teneva

Malware authors have managed to pass malicious apps through the Apple app notarization process for the second time this year and the second time in the past six weeks.

App notarization is a recent security protection formally introduced by Apple earlier this year.

You might also like

SolarWinds hack analysis reveals 56% boost in command server footprint

New US Justice Department team aims to disrupt ransomware operations

Facebook uncovers Palestinian government officials targeted with malware

It is a process that requires Mac app developers to submit their apps to Apple for a series of automated security scans that check for malware or other malicious code patterns.

Apps that pass through the scans are “notarized,” meaning they are added to a whitelist inside the Apple GateKeeper security service.

Once added to the GateKeeper whitelist, notarized apps can be opened and installed with a simple click, without any warnings or popups.

App notarization has been mandatory for all apps that want to run on Apple’s newest macOS releases, like Catalina and Big Sur.

The notarization process has been warmly received by both app users and developers, as it removed some of the friction of installing apps on macOS.

First wave of notarized malware

However, similar to Bouncer, the automated security system that scans Android apps before they are uploaded on the Google Play Store, Apple’s app notarization process was never expected to be perfect.

The first malicious apps that managed to pass through the notarization process and get whitelisted on newer versions of macOS were discovered at the end of August[1, 2].

In total, 40 apps passed through, apps that were infected with the Shlayer trojan and the BundleCore adware.

Second wave of notarized malware

But in a report published this week, Joshua Long, Chief Security Analyst for Mac security software maker Intego, said his company discovered six new apps that passed through the notarization process.

The six notarized apps posed as Flash installers, Long told ZDNet today. Once installed, the apps would download and install the OSX/MacOffers adware.

“OSX/MacOffers is best know for modifying the search engine in the victim’s browser,” Long told ZDNet.

Long said the six apps have now been de-notarized.

“Apple revoked the developer certificate while the malware was under investigation, before we had a chance to report it to Apple,” Long told us.

“It’s unclear how Apple became aware of it; perhaps they might have gotten a report from another researcher investigating the malware, or perhaps from a Mac user who encountered it in the wild.”

With Adobe set to retire Flash at the end of the year, Long urged users to stop downloading and installing Flash installers.

Credit: Zdnet

Previous Post

How Artificial Intelligence Is Reshaping Small Businesses

Next Post

How to evaluate the Machine Learning models? — Part 2 | by RAVI SHEKHAR TIWARI | Oct, 2020

Related Posts

SolarWinds hack analysis reveals 56% boost in command server footprint
Internet Security

SolarWinds hack analysis reveals 56% boost in command server footprint

April 22, 2021
New US Justice Department team aims to disrupt ransomware operations
Internet Security

New US Justice Department team aims to disrupt ransomware operations

April 22, 2021
Facebook uncovers Palestinian government officials targeted with malware
Internet Security

Facebook uncovers Palestinian government officials targeted with malware

April 22, 2021
Signal rattles sabre and exposes crackable Cellebrite underbelly
Internet Security

Signal rattles sabre and exposes crackable Cellebrite underbelly

April 22, 2021
User ability to opt-out key in Google FLoC debacle
Internet Security

User ability to opt-out key in Google FLoC debacle

April 22, 2021
Next Post
How to evaluate the Machine Learning models? — Part 2 | by RAVI SHEKHAR TIWARI | Oct, 2020

How to evaluate the Machine Learning models? — Part 2 | by RAVI SHEKHAR TIWARI | Oct, 2020

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

SolarWinds hack analysis reveals 56% boost in command server footprint
Internet Security

SolarWinds hack analysis reveals 56% boost in command server footprint

April 22, 2021
1-Click Hack Found in Popular Desktop Apps — Check If You’re Using Them
Internet Privacy

Researchers Find Additional Infrastructure Used By SolarWinds Hackers

April 22, 2021
What Does The Future Hold For the Companies Developing Mobile Apps
Data Science

What Does The Future Hold For the Companies Developing Mobile Apps

April 22, 2021
Twitter Updates its Responsible Machine Learning Initiative
Machine Learning

Twitter Updates its Responsible Machine Learning Initiative

April 22, 2021
New US Justice Department team aims to disrupt ransomware operations
Internet Security

New US Justice Department team aims to disrupt ransomware operations

April 22, 2021
Facebook Busts Palestinian Hackers’ Operation Spreading Mobile Spyware
Internet Privacy

Facebook Busts Palestinian Hackers’ Operation Spreading Mobile Spyware

April 22, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • SolarWinds hack analysis reveals 56% boost in command server footprint April 22, 2021
  • Researchers Find Additional Infrastructure Used By SolarWinds Hackers April 22, 2021
  • What Does The Future Hold For the Companies Developing Mobile Apps April 22, 2021
  • Twitter Updates its Responsible Machine Learning Initiative April 22, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates