BTC $70823.7516
ETH $3531.0259
BNB $621.2790
SOL $172.6448
stETH $3527.9907
XRP $0.6083
DOGE $0.1997
TON $7.2456
ADA $0.5853
AVAX $46.2175
wstETH $4100.4456
DOT $8.4402
BCH $607.1354
WETH $3536.6758
WBTC $70909.4458
TRX $0.1219
LINK $17.6560
MATIC $0.8809
UNI $9.0821
ICP $15.6959
LTC $97.8636
CAKE $3.7041
DAI $0.9996
IMX $2.5675
ETC $33.6641
RNDR $9.1096
FIL $8.1342
STX $2.9994
MNT $1.2895
NEAR $6.8343
TAO $615.5692
VET $0.0503
ATOM $10.8915
HBAR $0.0996
OKB $56.9032
FDUSD $1.0028
WIF $3.3890
KAS $0.1440
MKR $3344.9389
PEPE $0.0000
GRT $0.3114
THETA $2.8807
INJ $31.7467
FET $2.5067
XLM $0.1297
XMR $134.0517
USDE $1.0001
BTC $70823.7516
ETH $3531.0259
BNB $621.2790
SOL $172.6448
stETH $3527.9907
XRP $0.6083
DOGE $0.1997
TON $7.2456
ADA $0.5853
AVAX $46.2175
wstETH $4100.4456
DOT $8.4402
BCH $607.1354
WETH $3536.6758
WBTC $70909.4458
TRX $0.1219
LINK $17.6560
MATIC $0.8809
UNI $9.0821
ICP $15.6959
LTC $97.8636
CAKE $3.7041
DAI $0.9996
IMX $2.5675
ETC $33.6641
RNDR $9.1096
FIL $8.1342
STX $2.9994
MNT $1.2895
NEAR $6.8343
TAO $615.5692
VET $0.0503
ATOM $10.8915
HBAR $0.0996
OKB $56.9032
FDUSD $1.0028
WIF $3.3890
KAS $0.1440
MKR $3344.9389
PEPE $0.0000
GRT $0.3114
THETA $2.8807
INJ $31.7467
FET $2.5067
XLM $0.1297
XMR $134.0517
USDE $1.0001
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • New LockBit ransomware targets macOS

    MalwareHunterTeam cybersecurity researchers have discovered new LockBit ransomware specifically designed to attack Macs. This will be the first major ransomware campaign to target macOS.

    Experts found a ZIP archive on VirusTotal that appears to contain most of the new LockBit ransomware available.

    LockBit primarily uses encryptors designed to attack Windows, Linux, and VMware ESXi servers. However, the found archive also contained previously unknown ransomware for macOS, ARM, FreeBSD, MIPS, and SPARC processors.

    The archive contains a file named "locker_Apple_M1_64" which targets newer Macs running on the Apple Silicon processor. There are also encryptors for PowerPC processors that older Macs use.

    Note that "locker_Apple_M1_64" was uploaded to Virus Total back in December 2022, which indicates that these samples have been in use for some time.

    The study showed that the encryptor contains a list of 65 extensions and filenames that are excluded from encryption, all of which are Windows file extensions and folders. Among them are ".exe", ".bat", ".dll", "autorun.inf" and others.

    The good news is that these ransomware are most likely not ready to be deployed in real attacks on macOS devices. Cisco Talos researcher Azim Khodjibaev said the encryptors were intended for testing and were never intended to be used in real cyberattacks.

    What's more, a spokesperson for LockBit (LockBitSupp) confirmed to the media that the Mac encryptor is "actively developed."

    MacOS cybersecurity expert Patrick Wardle also confirmed Cisco's theory that these builds are in development/testing, stating that the encryptor is far from complete as it lacks the necessary features to properly encrypt Macs.

    Wardle added that the macOS encryptor is based on the Linux version and compiled for macOS with some basic configuration settings. In addition, when running the macOS ransomware, Wardle crashed due to a buffer overflow error in his code. Wardle's detailed technical analysis of the new ransomware for Mac can be found at Objective See.

    Author DeepWeb
    Chinese APT41 hackers actively use Google cloud infrastructure in their attacks
    Hackers were able to seize control of the satellite

    Comments 0

    Add comment