![]() However, this needed password confirmation from the user, which was rather a giveaway. The first generation used an API to gain the privileges needed to install a Launch Daemon. The method used to hide the malware from detection is somewhat involved – and Jamf said it was far better disguised than the first two generations. The source was a well-known Pirate Bay uploader, whose cracked apps include Photoshop, Logic Pro, and Final Cut Pro. A handful of vendors seemed to have started detecting the malware since January 2023, however, some of the maliciously modified applications continue to go unidentified. Further investigation revealed that this was a modified, malicious version of Final Cut Pro that was executing XMRig in the background.Īt the time of our discovery, this particular sample was not being detected as malicious by any security vendors on VirusTotal. This particular instance was of interest to us as it was executing under the guise of the Apple-developed video editing software, Final Cut Pro. While XMRig is commonly used for legitimate purposes, its adaptable, open-source design has also made it a popular choice for malicious actors. Over the past few months Jamf Threat Labs has been following a family of malware that resurfaced and has been operating undetected, despite an earlier iteration being a known quantity to the security community.ĭuring routine monitoring of our threat detections seen in the wild, we encountered an alert indicating XMRig usage, a command line crypto-mining tool. However, Jamf Threat Labs found an example of Mac cryptomining malware that managed to evade detection – initially by all Mac security apps. Usually, Mac security software will detect this type of malware. It’s a significant concern, because the malware will use a lot of your device’s resources, leaving less power to run your own apps. It’s no surprise that pirate software frequently contains malware, and cryptojacking is one of the more common examples. This is where they get malware onto a significant number of other people’s devices in order to mine currency for them as a background process. Jamf also warned that the power of Apple Silicon Macs is going to make them increasingly popular targets for cryptojacking – where malware uses your machine’s considerable processing power to mine cryptocurrencies for the benefit of attackers … BackgroundĪs cryptocurrencies like Bitcoin have grown harder and harder to mine, demanding extensive GPU resources, there have been increasing incentives for bad actors to use cryptojacking techniques. The firm says that the cryptojacking malware was particularly well hidden, and not detected by most Mac security apps. Some Motion templates on this webpage are available from : Apple has now commented on the findings – see the end of the piece.Ĭybersecurity company Jamf Threat Labs has found Mac cryptomining malware in pirate copies of Final Cut Pro.Performance tests are conducted using specific computer systems and reflect the approximate performance of Mac Studio and iMac. Prerelease Final Cut Pro 10.6.2 tested using a complex 5-minute project with 8K ProRes 422 media. Testing conducted by Apple in February 2022 using preproduction Mac Studio systems with Apple M1 Ultra, 20-core CPU, 64-core GPU, 128GB of RAM, and 8TB SSD, as well as production 3.6GHz 10-core Intel Core i9-based 27-inch iMac systems with Radeon Pro 5700 XT graphics with 16GB of GDDR6, 128GB of RAM, and 8TB SSD. ![]() Prerelease Final Cut Pro 10.6.2 tested using a 5-minute project with 4K Apple ProRes 4444 media, at 3840x2160 resolution and 23.98 frames per second, transcoded to Apple ProRes 422. ![]() Performance tests are conducted using specific computer systems and reflect the approximate performance of Mac Studio. Prerelease Final Cut Pro 10.6.2 tested using a 1-minute picture-in-picture project with 18 streams of Apple ProRes 422 video at 8192x4320 resolution and 30 frames per second, as well as a 1-minute picture-in-picture project with 56 streams of Apple ProRes 422 video at 3840x2160 resolution and 29.97 frames per second. Testing conducted by Apple in February 2022 using preproduction Mac Studio systems with Apple M1 Ultra, 20-core CPU, 64-core GPU, 128GB of RAM, and 8TB SSD. ![]() macOS Ventura or later is required to edit Cinematic mode video captured on devices with iOS 16 or later. macOS Monterey or later is required to edit Cinematic mode video on devices with iOS 15. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |