MacOS Update Fixes Zero-day Bug Exploited By Shlayer Malware

Share post:

Apple has released a security update to fix the vulnerability in macOS Big Sur 11.3 and to block malware campaigns that actively abuse it. It fixes a zero-day vulnerability in macOS that is exploited in the wild by Shlayer malware to bypass Apple’s file quarantine, gatekeeper, and even notary security checks.

With the new update, users are now advised that malicious apps “cannot be opened because the developer cannot be identified.” They are also advised to eject the mounted disk image because it may contain malware.

Whereas in the past, the creators of Shlayer succeeded in getting their malicious payloads through Apple’s automated notarization process, passing Apple’s automated security audit means that macOS apps are allowed by Gatekeeper to run macOS security functionality on the system.

Shlayer also used a two-year-old technique to extend privileges and disable macOS ‘Gatekeeper while executing unsigned second-stage payloads in a campaign detected by Carbon Black’s Threat Analysis Unit. According to security expert Patrick Wardle, the bug that has now been fixed will exploit gatekeepers logic flaws in the way it verifies that app packages have been notarized to run on fully patched macOS systems.

For more information, read the <a href=”_wp_link_placeholder” data-wplink-edit=”true”>original story</a> in Bleeping Computer

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways