|
You are here |
www.jamf.com | ||
| | | | |
objective-see.org
|
|
| | | | | [AI summary] An analysis of a pirated UltraEdit macOS application containing malicious dynamic libraries that download and execute remote malware payloads including a Khepri agent and a persistent launch agent. | |
| | | | |
blog.quarkslab.com
|
|
| | | | | The following article explains how during a Purple Team engagement we were able to identify a vulnerability in Microsoft Teams on macOS allowing us to access a user's camera and microphone. | |
| | | | |
theevilbit.github.io
|
|
| | | | | TL;DR Link to heading On macOS Mojave Gatekeeper only verifies executables, which are run with the open command or the user double clicks. It won't verify files, that are executed through other means like, directly executing a binary ./myapp regardless of the quarantine attribute. If you can place a plist file inside LaunchAgents/LaunchDaemons, the command inside will also be executed. Prior to Catalina there is a way to trick users to drag & drop files in the LaunchAgents folder. On macOS Catalina lot has changed, the most notable one regarding gatekeeper is that it will verify files when executed via classic 'exec' methods. | |
| | | | |
blog.hobbyistsoftware.com
|
|
| | | [AI summary] A developer shares a tutorial on how to access related Objective-C header files from an app's info.plist in the Mac sandbox using a custom FilePresenter and NSFileCoordinator. | ||