Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Researchers: North Korean hackers develop new malware that can bypass Apple notarization and invade macOS systems

Researchers: North Korean hackers develop new malware that can bypass Apple notarization and invade macOS systems

CointimeCointime2024/11/13 01:11
By:Cointime

On November 13th, it was reported that North Korean hackers have developed malicious software that can bypass Apple's security checks. Researchers at Jamf Threat Labs, who focus on Apple, said that these applications appear to be experimental. This is the first time they have seen this technology used to invade Apple's macOS operating system, but it will not run on the latest systems.

Researchers found that Microsoft's VirusTotal online scanning service reported that these applications were harmless, but in reality, they are malicious. These application variants were written in Go and Python languages and used the Google Flutter application. Flutter is an open-source development toolkit that can be used to create multi-platform applications.

Five of the six malicious applications have developer account signatures and have been temporarily certified by Apple. The researchers wrote, "The domain names and technology in this malicious software are very similar to those used in other North Korean hacker malware, indicating that this malicious software has been signed and even temporarily certified by Apple."

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!