BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
BTC $63442.8276
ETH $3469.7477
BNB $414.4838
SOL $128.8578
XRP $0.6333
ADA $0.7553
DOGE $0.1556
AVAX $42.2817
DOT $9.6926
wstETH $4022.3454
TRX $0.1396
LINK $20.2249
WETH $3455.5461
MATIC $1.0912
UNI $12.3248
WBTC $63402.0644
BCH $454.1971
LTC $89.7149
IMX $3.2697
ICP $13.1197
FIL $10.0810
CAKE $3.2889
ETC $33.3804
LEO $4.7626
ATOM $12.4298
RNDR $7.5236
TON $2.6714
KAS $0.1683
HBAR $0.1120
INJ $39.9268
DAI $0.9998
OKB $57.5556
VET $0.0485
STX $3.0863
FDUSD $0.9998
WEMIX $2.8006
XLM $0.1364
NEAR $4.5218
PEPE $0.0000
XMR $146.1340
LDO $3.3155
GRT $0.3143
ARB $1.9894
THETA $2.3291
TIA $15.9776
ENS $21.4774
CRO $0.1387
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • New LockBit ransomware targets macOS

    MalwareHunterTeam cybersecurity researchers have discovered new LockBit ransomware specifically designed to attack Macs. This will be the first major ransomware campaign to target macOS.

    Experts found a ZIP archive on VirusTotal that appears to contain most of the new LockBit ransomware available.

    LockBit primarily uses encryptors designed to attack Windows, Linux, and VMware ESXi servers. However, the found archive also contained previously unknown ransomware for macOS, ARM, FreeBSD, MIPS, and SPARC processors.

    The archive contains a file named "locker_Apple_M1_64" which targets newer Macs running on the Apple Silicon processor. There are also encryptors for PowerPC processors that older Macs use.

    Note that "locker_Apple_M1_64" was uploaded to Virus Total back in December 2022, which indicates that these samples have been in use for some time.

    The study showed that the encryptor contains a list of 65 extensions and filenames that are excluded from encryption, all of which are Windows file extensions and folders. Among them are ".exe", ".bat", ".dll", "autorun.inf" and others.

    The good news is that these ransomware are most likely not ready to be deployed in real attacks on macOS devices. Cisco Talos researcher Azim Khodjibaev said the encryptors were intended for testing and were never intended to be used in real cyberattacks.

    What's more, a spokesperson for LockBit (LockBitSupp) confirmed to the media that the Mac encryptor is "actively developed."

    MacOS cybersecurity expert Patrick Wardle also confirmed Cisco's theory that these builds are in development/testing, stating that the encryptor is far from complete as it lacks the necessary features to properly encrypt Macs.

    Wardle added that the macOS encryptor is based on the Linux version and compiled for macOS with some basic configuration settings. In addition, when running the macOS ransomware, Wardle crashed due to a buffer overflow error in his code. Wardle's detailed technical analysis of the new ransomware for Mac can be found at Objective See.

    Author DeepWeb
    Chinese APT41 hackers actively use Google cloud infrastructure in their attacks
    Hackers were able to seize control of the satellite

    Comments 0

    Add comment