The first malicious software designed for a Mac with an Apple M1 processor detected

0
308

The first malicious software designed for a Mac with an Apple M1 processor detected

Independent digital security researcher Patrick Wardle has discovered the first-ever malicious software designed to run on devices with an ARM-based Apple M1 processor. The latest models of MacBook Air, MacBook Pro, and Mac mini work based on the latter. The peculiarity of the exploit is described on the Objective See website.

Apple M1 processor
Apple M1 processor

According to the source, the malware for the Apple M1 is called GoSearch22.app. It was originally developed for Mac systems based on x86-compatible Intel processors, but the developers of the malicious application rewrote its code for the new Apple platform. The researcher reports that the exploit is related to the Pirrit adware, which allows attackers to display more ads on users’ devices and collect browser data.

The expert’s report also points out that antivirus programs that had no problem detecting malicious code on Intel-based Mac computers could not detect it on systems with Apple M1 chips. Apparently, the records of the new exploit are not yet in the antivirus databases.

At the moment, only one of the first modifications of GoSearch22.app has been discovered, which does not cause serious harm to users. However, it is already clear that attackers have learned how to create native malware for devices with Apple M1.

It is unknown how many this adware has already infected Apple Mac devices. According to Tom’s Hardware, citing data from analysts at TrendForce, Mac computers’ share-based on Apple M1 was about 0.8% of the total number of PCs in January of this year. It is projected that by this summer, branded processors will help Mac achieve a 7% share of the PC market. Apple has not yet commented on the latest study.

Also Read:  Apple is preparing new processors for the Mac, which will be more powerful than Intel flagships