Google helps Apple patch critical bug in macOS

New Delhi, Nov 12 (SocialNews.XYZ) Google security researchers have revealed that hackers targeting visitors to websites in Hong Kong were using an undisclosed, zero-day flaw in Apple MacOS software to snoop on people.

Google's Threat Analysis Group (TAG) discovered watering hole attacks in August, targeting visitors to Hong Kong websites for a media outlet and a prominent pro-democracy labor and political group.

"Based on our findings, we believe this threat actor to be a well-resourced group, likely state backed, with access to their own software engineering team based on the quality of the payload code," the TAG team said in a blog post on Thursday.

Apple patched the bug in a macOS Catalina update in September.

"A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild," said Apple, giving Google researchers credit for discovering the flaw.

The websites leveraged for the attacks contained two iframes which served exploits from an attacker-controlled server - one for iOS and the other for macOS.

"We continue to collaborate with internal teams like Google Safe Browsing to block domains and IPs used for exploit delivery and industry partners like Apple to mitigate vulnerabilities. We are appreciative of Apple's quick response and patching of this critical vulnerability," Google said.

Source: IANS

Facebook Comments

About Gopi

Gopi Adusumilli is a Programmer. He is the editor of SocialNews.XYZ and President of AGK Fire Inc.

He enjoys designing websites, developing mobile applications and publishing news articles on current events from various authenticated news sources.

When it comes to writing he likes to write about current world politics and Indian Movies. His future plans include developing SocialNews.XYZ into a News website that has no bias or judgment towards any.

He can be reached at gopi@socialnews.xyz

Share

This website uses cookies.

%%footer%%