![]() ![]() ![]() And it's a fat binary with code for both x86-64 and ARM64 chips, indicating it was created to run on Macs rather than iOS devices. It's a derivation of the older Pirrit adware, first spotted in 2016 and still plaguing Macs. He got more than 200 results, but most were for iOS jailbreaking software that was built to run on both older and newer iPhone/iPad chips. So he searched in the online VirusTotal database for malware that met all the right parameters.Īmong other things, it had to be written for macOS or iOS, contain ARM64 instructions, support more than one chip architecture, be digitally "signed" by an Apple developer and be detected as malware by at least two antivirus engines. Wardle wondered if any known malware was secretly using fat binaries that hadn't yet been spotted.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |