The LockBit ransomware crew has developed a macOS-based payload that has been available since November 11, 2022, and has managed to evade detection by anti-malware engines until now.
It is the second most used ransomware in March 2023, and its new macOS version relies on an invalid signature to sign the executable.
Security researchers have pointed out additional safeguards implemented by Apple, such as System Integrity Protection (SIP) and Transparency, Consent, and Control (TCC) to prevent execution of unauthorized code and require user permission to access protected data.
This shows that threat actors are increasingly targeting macOS systems, and is likely to pose a serious threat in the future.
๐ Feeling the vibes?
Keep the good energy going by checking out my Amazon affiliate link for some cool finds! ๐๏ธ
If not, consider contributing to my caffeine supply at Buy Me a Coffee โ๏ธ.
Your clicks = cosmic support for more awesome content! ๐๐
Leave a Reply