Warning: The number of malware designed to target the M1 chipset is increasing rapidly, making it harder to detect
Apple's decision to include the company's self-developed M1 chip on a series of MacBook, iMac, and even iPad Pro models, has brought a very positive response from the market. Up to now, it can be said that this is a successful step of the US technology giant when the new chip gives MacBooks impressive performance as well as good software compatibility.
The success of the MacBook M1 became a favorite technology product, and this also attracted the attention of hackers. The transition to Apple's new chip requires app developers to build new versions of their products to ensure better performance and compatibility. On the opposite side, hackers are taking similar steps to create new strains of malware with native execution capabilities, allowing them to work more efficiently on Apple's M1 systems.
As noted by security experts as well as anti-malware solutions, more and more malware targeting the M1 chipset has been detected and disabled recently. In other words, the number of new types of malware designed to specifically target the M1 and products using this chip is growing rapidly.
In theory, devices running on the new M1 architecture should be better protected against physical access and remote exploitation by general malicious actors. However, to deal with this, malware developers have redesigned their malicious code (usually Windows malware) to be able to run more efficiently on the macOS operating system.
According to Apple's security expert Patrick Wardle, more and more malware targeting the M1 platform has been reported, many of which are Windows-derived variants. "As attackers evolve and change the way they deploy their malware, we, as malware analysts and security researchers, need to keep a close eye on that," he said. the expert added. According to statistics, up to half of all macOS malware recorded in 2020 are customized from Windows or Linux variants.
Wardle's research found that when anti-malware systems split macOS malware binaries, one for Intel-based Mac platforms and one for M1-based platforms, the results show that malware targeting Intel platforms is generally easier to detect than variants targeting M1, with a rate of about 10%.
This led Patrick Wardle to conclude that the signatures of most current anti-virus software on macOS only work effectively on Intel processor platforms, not Apple Silicon like M1. However, the same researcher also stated that the M1 system can essentially be more effective in enhancing security at the hardware level.
You should read it
- What is Apple's R1 chip? How does the R1 chip compare to the M1 and M2?
- Apple will stop using Intel chips on Macs from 2020, switching to 'homegrown' chips.
- Malware sneaks into iOS through Apple's official distribution channels
- Malicious code is hidden in cheats and mods that target the gaming community
- Detects new Xcode malware targeting iOS developers
- Apple began manufacturing 7nm A12 processors for iPhone 2018
- A hacker in the United Kingdom found a way to temporarily encrypt the WannaCry malware
- Funny caption of hackers spreading WannaCry malicious code
May be interested
- This malware was written in an unusual programming language, making it extremely difficult to detectinternational cybersecurity researchers have discovered a relatively popular cyberattack campaign that is actively spreading a new type of malware. it is worth mentioning that this malicious code is written in a rather strange programming language, very rarely used to compile malicious code.
- How to Protect Yourself from the Latest WordPress Malware Attackas one of the most popular website building tools in the world, wordpress is once again a target for malware.
- Online anti-malware toolyou may need to use a utility that can detect, update and process malware automatically. all are available in the latest malware radar system provided by security vendor panda.
- Google can detect cryptocurrency mining malware without needing to install software on the user's computerbecause there is no need to install software, detecting cryptocurrency mining malware will not affect the device's performance.
- Use Nepenthes Honeypots to detect common malwareover the past few years, a large number of serious bugs in the windows operating system have been discovered. like ms03-026, exploited and dispersed by the blaster worm in 2003; or lately is mocbot / wargbot worm, exploiting the ms06-040 vulnerability from
- Warning: The number of vulnerabilities in open source software are increasing rapidlybesides malware, spam emails or ddos attacks, vulnerabilities in open source software are also considered as one of the most significant security threats at the moment.
- 2022 could be the year of Linux malwarethe number of malware (malicious code) detected on linux environments is increasing alarmingly, along with the popularity of internet of things (iot) devices.
- What is SquirrelWaffle malware? How to avoid?called dropper malware, the developers of squirrelwaffle have gone to great lengths to keep it hard to detect and analyze.
- The number of malware on Macs is nearly double that of Windowsmacs are safer and less likely to be infected with malware than windows, which many users still trust. however, this is no longer true when a recent report showed that in 2019, the number of threats targeting the mac surpassed the pc by 2: 1.
- 5 tips to help detect signs of malwareremoving the spread of malicious code by malware on your computer as quickly as possible will prevent malware from adding any malicious action or infecting other computers.