• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
  • / yourpost
home / News / Hackers deceive Apple with Shlayer applications

Hackers deceive Apple with Shlayer applications

01/09/2020 20:35 by Anastasis Vasileiadis

The creators of the malicious software of Mac Shlayer applications, managed to gain access through payloads to Apple.

From February 2020, all Mac software distributed outside the Mac App Store must be Apple-signed in order to run on MacOS Catalina or later.

Screenshot 2020 09 01 Malware authors trick Apple into trusting malicious Shlayer apps1 - Hackers cheat Apple with Shlayer apps

The signing process requires developers to submit the software they created for the macOS platform for scanning through Apple's service, an automated system designed to scan software for both malware and code signing issues.

If they pass this automated security check, applications will be accepted by macOS Gatekeeper, a macOS security feature that checks if downloaded applications have been checked for malicious content in order to run them on the system.

According to Apple, if there is ever a problem with an application, the company immediately stops the new installation and in addition is able to prevent the application from starting.

Apple's signature process failed

Although the company says that the software signed for macOS is designed to give users more security, as discovered by Peter Dantini last week, Apple was deceived by the malicious Shlayer software.

He found that adware Shlayer is distributed through a fake and malicious page and could be run on any Mac device running macOS Catalina without automatically blocking it.
This is the reason why adware managed to load the payload on its victims.

So I accidentally found a thing https://t.co/WVL86rYzrm

- Peter H. Dantini (@PokeCaptain) August 31

After Wardle reported the malware samples to Apple, the company reacted immediately and revoked the certificates (meaning they will be automatically stopped by Gatekeeper) on the same day, August 28th.

Screenshot 2020 09 01 Malware authors trick Apple into trusting malicious Shlayer apps - Hackers deceive Apple with Shlayer apps

Although some Mac users believe that malware only targets Windows and that Mac devices are secure, Shlayer attacks 10% of all Mac devices, according to a January 2020 report by Kaspersky.

Shlayer was first spotted by Intego's research team, and was distributed in February 2018, disguised as a fake Adobe Flash Player installer like many other malware campaigns targeting the macOS platform.

Hackers deceive Apple with Shlayer applications was last modified: 1 September, 2020, 8: 35 mm by Anastasis Vasileiadis

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: Newstag: apple

You May Also Like

Massive data leak from Apple
Smartphone in fourth place Apple after Xiaomi
Apple App Store reduction of commission to 15%

About Us Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Previous Post: « Lenovo: away from Windows 10 May 2020 Update
Next Post: WordPress 5.5.1 has just been released »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loading Cancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.