GeistHaus
log in · sign up

https://objective-see.org/rss.xml

rss
100 posts
Polling state
Status active
Last polled May 19, 2026 15:45 UTC
Next poll May 19, 2026 15:55 UTC
Poll interval 600s
ETag W/"6a02d426-e13d"
Last-Modified Tue, 12 May 2026 07:17:58 GMT

Posts

Mac Malware of 2017
Let's look at all the mac malware from 2017, for each - discussing their infection vector, persistence mechanism, features & goals.
https://objective-see.org/blog/blog_0x25.html
All Your Docs Are Belong To Us
Here, we reverse, then 'extend' a popular macOS anti-virus engine. With the creation of a new anti-virus signature, classified documents will be automatically detected!
https://objective-see.org/blog/blog_0x22.html
Ay MaMi - Analyzing a New macOS DNS Hijacker
OSX/MaMi (the first Mac malware of 2018) hijacks infected users' DNS settings and installs a malicious certificate into the System keychain, in order to give remote attackers 'access' to all network traffic
https://objective-see.org/blog/blog_0x26.html
An Unpatched Kernel Bug
On my flight to ShmooCon, I managed to panic my fully-patched MacBook. Here we analyze the kernel panic report, finding that Apple's AMDRadeonX4150 kext is responsible for the crash.
https://objective-see.org/blog/blog_0x27.html
Analyzing CrossRAT
The EFF/Lookout discovered a cross-platform implant, named CrossRat with ties to nationstate operators. Here, we tear it apart; analyzing its persistence mechanisms, features, and network communications.
https://objective-see.org/blog/blog_0x28.html
Analyzing OSX/CreativeUpdater
Recently, the popular MacUpdate website was subverted to distribute a new macOS cryptominer; OSX/CreativeUpdater.
https://objective-see.org/blog/blog_0x29.html
Who Moved My Pixels?!
In this guest blog post my friend Mikhail Sosonkin reverses Apple's screencapture utility, discusses Mac malware that captures desktop images, and suggests methods for screen-capture detection!
https://objective-see.org/blog/blog_0x2C.html
An Insecurity in Apple's Security Framework?
Turns out that writing security tools is a great way to inadvertently uncover bugs in macOS. How about a crash in Apple's 'Security' framework ... that can't be good!?
https://objective-see.org/blog/blog_0x2D.html
When Disappearing Messages Don't Disappear
Did you know on macOS, notifications are stored in a unencrypted database? Which means that even 'disappearing' messages from apps such as Signal - may not really disappear. Yikes!
https://objective-see.org/blog/blog_0x2E.html
Breaking macOS Mojave (Beta)
In macOS Mojave apps, to have to obtain user permission before using the Mac camera & microphone. We'll illustrate how this is trivial to bypass (at least in the current beta).
https://objective-see.org/blog/blog_0x2F.html
Cache Me Outside
Are full paths and preview thumbnails for files even on encrypted containers and removable usb devices really persistently stored? ...yes :( Apple's 'QuickLook' cache is to blame.
https://objective-see.org/blog/blog_0x30.html
OSX.Dummy
A new Mac malware targets the cryptocurrency community. In this post, we dive into the malware and illustrate how Objective-See's tools can generically thwart this new threat at every step of the way.
https://objective-see.org/blog/blog_0x32.html
Block Blocking Login Items
Apple recently updated the way login items are stored by the OS. In this post, we'll illustrate how to parse the (new) login item files to detect persistence
https://objective-see.org/blog/blog_0x31.html
[0day] Bypassing SIP via Sandboxing
In this guest blog post @CodeColorist writes about a neat macOS vulnerability. Ironically, by abusing security mechanisms such as sandboxing, macOS can be coerced to load an untrusted library, into a SIP-entitled process!
https://objective-see.org/blog/blog_0x33.html
A Remote iOS Bug
Apple wrote code to appease the Chinese government ...it was buggy. In certain configurations, iOS devices were vulnerable a "emoji-related" flaw that could be triggered remotely!
https://objective-see.org/blog/blog_0x34.html
Escaping the Microsoft Office Sandbox
Imagine you've gained remote code execution on a Mac via a malicious Word document. Turns out, you're still stuck in a sandbox. However, via a faulty regex, you can escape and persist!
https://objective-see.org/blog/blog_0x35.html
[0day] Synthetic Reality
If you can programmatically generate synthetic mouse clicks, you can break macOS! Approving kernel extensions, dismissing privacy alerts, and much more more...
https://objective-see.org/blog/blog_0x36.html
Remote Mac Exploitation Via Custom URL Schemes
The WINDSHIFT APT group is successfully infecting Macs with a novel infection mechanism. By abusing custom URL scheme handlers and minimal user interaction, Macs can be remotely compromised!
https://objective-see.org/blog/blog_0x38.html
A Deceitful 'Doctor' in the Mac App Store
A massively popular app from the official Mac App Store, surreptitiously steals your browsing history! By fully reversing the application, we can fully expose its functionality and rather shady capabilities.
https://objective-see.org/blog/blog_0x37.html
[0day] Mojave's Sandbox is Leaky
The macOS sandbox is seeks to prevent malicious applications from surreptitiously spy on unsuspecting users. Turns out, it's trivial to sidestep some of these protections, resulting in significant privacy implications!
https://objective-see.org/blog/blog_0x39.html
Word to Your Mac
A malicious Word document targeting macOS users, was recently uncovered. Let's extract the embedded macros, decode an embedded downloader, and retrieve the 2nd-stage payload!
https://objective-see.org/blog/blog_0x3A.html
Middle East Cyber-Espionage
The APT group WindShift has been targeting Middle Eastern governments with Mac implants. Let's analyze their 1st-stage macOS implant: OSX.WindTail!
https://objective-see.org/blog/blog_0x3B.html
The Mac Malware of 2018
Our annual report on all the Mac malware of the year - including samples for download, infection vectors, persistence mechanisms, payloads and more!
https://objective-see.org/blog/blog_0x3C.html
Middle East Cyber-Espionage (part two)
The APT group WindShift has been targeting Middle Eastern governments with Mac implants. Let's (continue to) analyze their 1st-stage macOS implant: OSX.WindTail!
https://objective-see.org/blog/blog_0x3D.html
Death by vmmap
A core Mojave utility is rather disastrously broken - causing a full-system lockup. Let's find out why!
https://objective-see.org/blog/blog_0x3E.html
Mac Adware, à la Python
Let's tear apart a persistent piece of adware, decompiling, decoding, and decompressing it's code to uncover its methods and capabilities.
https://objective-see.org/blog/blog_0x3F.html
Rootpipe Reborn (Part I)
In part one of a guest blog post, @CodeColorist writes about several neat macOS vulnerabilities.
https://objective-see.org/blog/blog_0x40.html
Rootpipe Reborn (Part II)
@CodeColorist continues writing about bugs, such as CVE-2019-8521 and CVE-2019-8565 that provide a mechanism to elevate privileges to root on macOS.
https://objective-see.org/blog/blog_0x41.html
"Objective by the Sea" v2.0
After the success of #OBTS v1.0, we decided to go international and plan #OBTS v2.0 in Europe! In this blog post, we re-live the highlights (from Monaco!) of "Objective by the Sea" v2.0.
https://objective-see.org/blog/blog_0x42.html
Burned by Fire(fox) (Part I)
Recently, an attacker targeted (Mac) users via a Firefox 0day. In this first post, we triage and identify the malware (OSX.NetWire.A) utilized in this attack, identifying its methods of persistence, and more!
https://objective-see.org/blog/blog_0x43.html
Burned by Fire(fox) (Part II)
Recently, an attacker targeted (Mac) users via a Firefox 0day. In this second post, we fully reverse OSX.NetWire.A, revealing (for the first time!), its inner workings and complex capabilities.
https://objective-see.org/blog/blog_0x44.html
Burned by Fire(fox) (Part III)
Recently, an attacker targeted (Mac) users via a Firefox 0day. In this third post, we analyze a second backdoor used in the attack, detailing its persistence, capabilities, and ultimate identify it a new variant of the cross-platform Mokes malware!
https://objective-see.org/blog/blog_0x45.html
Getting Root with Benign AppStore Apps
In this guest blog post, "Objective by the Sea" speaker, Csaba Fitzl writes about an interesting way to get root via Apps from the official Mac App Store!
https://objective-see.org/blog/blog_0x46.html
Pass the AppleJeus
A new macOS backdoor written by the infamous Lazarus APT group needs analyzing. Here, we examine it's infection vector, method of persistence, capabilities, and more!
https://objective-see.org/blog/blog_0x49.html
[0day] Abusing XLM Macros in SYLK Files
A 0day logic flaw in Microsoft Excel leads to 'remote' code execution on macOS, via malicious macros.
https://objective-see.org/blog/blog_0x50.html
Lazarus Group Goes 'Fileless'
The rather infamous APT group, "Lazarus", continues to evolve their macOS capabilities. Today, we tear apart their latest 1st-stage implant that supports remote download & in-memory execution of secondary payloads!
https://objective-see.org/blog/blog_0x51.html
Mass Surveillance, is an (un)Complicated Business
A massively popular iOS application turns out to be a government spy tool! Here, we analyze the app; decrypting its binary and studying its network traffic.
https://objective-see.org/blog/blog_0x52.html
The Mac Malware of 2019
Our annual report on all the Mac malware of the year - including samples for download, infection vectors, persistence mechanisms, payloads and more!
https://objective-see.org/blog/blog_0x53.html
Weaponizing a Lazarus Group Implant
The Lazarus group's latest implant/loader supports in-memory loading of 2nd-stage payloads. In this post we describe exactly how to repurposing this 1st-stage loader to execute *our* custom 'fileless' payloads!
https://objective-see.org/blog/blog_0x54.html
Sniffing Authentication References on macOS
CVE-2017-7170 was a local priv-esc vulnerability that affected OSX/macOS for over a decade! Here (for the first time!), we dive into the technical details of finding the bug, the core flaw, and exploitation.
https://objective-see.org/blog/blog_0x55.html
The 'S' in Zoom, Stands for Security
Today we uncover two (local) security flaws in Zoom's latest macOS client. First, a privilege escalation vulnerability, and second, a method to surreptitiously access a user's webcam and microphone (via Zoom).
https://objective-see.org/blog/blog_0x56.html
The Dacls RAT ...now on macOS!
A sophisticated Lazarus Group implant has arrived on macOS. In this post, we deconstruct the Mac variant of a OSX.Dacls, detailing its install logic, persistence, and capabilities.
https://objective-see.org/blog/blog_0x57.html
Catching macOS Stealers in the Wild
macOS stealers continue to be a pervasive threat! In this guest blog post, one of our #OBTS student scholars, Pablo Redondo Castro, shares the technical details of a macOS stealer (likely AMOS-related) he analyzed.
https://objective-see.org/blog/blog_0x88.html
No Paste for You!
In macOS 26.4, Apple added ClickFix protections. In this post, we reverse macOS to uncover exactly how these protections are implemented, and whether we can replicate the same approach in our own tools.
https://objective-see.org/blog/blog_0x87.html
Building a Firewall ...via Endpoint Security!?
You can now build macOS firewalls/network tools via Endpoint Security ...no Network Extension needed! In this post, we reverse macOS 26.4's new ES_EVENT_TYPE_RESERVED_* ES events shows some are network auth/notify hooks.
https://objective-see.org/blog/blog_0x86.html
ClickFix: Stopped at ⌘+V
ClickFix represents a shift in attacker tradecraft, exploiting user trust rather than software vulnerabilities. In this post, we introduce a lightweight execution-boundary defense that intervenes at paste time to generically disrupt most ClickFix-style attacks on macOS.
https://objective-see.org/blog/blog_0x85.html
The Mac Malware of 2025
It's here! Our annual report on all the Mac malware of the year (2025 edition). Besides providing samples for download, we cover infection vectors, persistence mechanisms, payloads and more!
https://objective-see.org/blog/blog_0x84.html
A Remote Pre-Authentication Overflow in LLDB's debugserver
In this guest blog post, Nathaniel Oh, details a recent bug he discovered and reported to Apple: a remote pre-authentication buffer overflow in LLDB’s debugserver, now patched as CVE-2025-43504.
https://objective-see.org/blog/blog_0x83.html
Restoring Reflective Code Loading on macOS (Part II)
Let's continue our research into fully restoring reflective code loading on macOS — now with support for macOS 26 and in-memory Objective-C payloads. And what about detection? We cover that too!
https://objective-see.org/blog/blog_0x82.html
[0day] From Spotlight to Apple Intelligence
Malicious Spotlight plugins can leak bytes from TCC-protected files. And while the core bug was publicly disclosed almost a decade ago, it's still present in macOS 26!
https://objective-see.org/blog/blog_0x81.html
Leaking Passwords (and more!) on macOS
In this guest blog post, researcher Noah Gregory shares the technical details of a bug he uncovered (that was subsequently patched by Apple as CVE-2024-5447).
https://objective-see.org/blog/blog_0x7E.html
The Mac Malware of 2024
It's here! Our annual report on all the Mac malware of the year (2024 edition). Besides providing samples for download, we cover infection vectors, persistence mechanisms, payloads and more!
https://objective-see.org/blog/blog_0x7D.html
This Meeting Should Have Been an Email
A DPRK stealer, dubbed BeaverTail, targets users via a trojanized meeting app. Let's analyze it comprehensively.
https://objective-see.org/blog/blog_0x7A.html
Apple Gets an 'F' for Slicing Apples
Universal binaries contain multiple architecture-specific Mach-O, known as slices ...however, it turns out the Apple API to identify the best slice is broken. Let's investigate and find out why!
https://objective-see.org/blog/blog_0x80.html
Why Join The Navy If You Can Be A Pirate?
From a security point of view, pirating software is not recommended! Let's analyze a pirated application that contains a (malicious) surprise.
https://objective-see.org/blog/blog_0x79.html
Analyzing DPRK's SpectralBlur
The first malware of 2024 is (already) here. Let's dive in!
https://objective-see.org/blog/blog_0x78.html
The Mac Malware of 2023
It's here! Our annual report on all the Mac malware of the year (2023 edition). Besides providing samples for download, we cover infection vectors, persistence mechanisms, payloads and more!
https://objective-see.org/blog/blog_0x77.html
It's Turtles All The Way Down
Yet more ransomware targeting macOS! In this post we analyze the newly discovered "Turtle" ransomware and provide both a decryptor and a method to procactively thwart it.
https://objective-see.org/blog/blog_0x76.html
The LockBit ransomware (kinda) comes for macOS
The infamous LockBit ransomware group has created a macOS variant. In this post we comprehensively analyze this new threat, showing it's not ready for prime-time and iw easily detected with heuristic-based approaches.
https://objective-see.org/blog/blog_0x75.html
Where there is love, there is ...malware?
Today, Valentine's day, is a day to celebrate love, and for better or worse one my main loves is malware. Let's analyze a new macOS backdoor/updater component: 'iWebUpdate' ...which has been around, undetected for 5 years!
https://objective-see.org/blog/blog_0x72.html
The Mac Malware of 2022
It's here! Our annual report on all the Mac malware of the year (2022 edition). Besides providing samples for download, we cover infection vectors, persistence mechanisms, payloads and more!
https://objective-see.org/blog/blog_0x71.html
How Shlayer Hides its Configuration
The prolific adware known as Shlayer continues to evolve in creative ways! In this guest blog post, security researcher Taha Karim, details an unusual Shlayer sample that encrypts its configuration within the DMG file header structure.
https://objective-see.org/blog/blog_0x70.html
SeaFlower 藏海花
It's not everyday that we get to talk about backdoors targeting iOS users. In this guest blog post, security researcher Taha Karim, details a sophisticated threat targeting iOS web3 users.
https://objective-see.org/blog/blog_0x6F.html
From The DPRK With Love
A report from the Cybersecurity & Infrastructure Security Agency detailed "[A] North Korean State-Sponsored APT Target[ing] Blockchain Companies." We build upon CISA's report, diving deeper into one of the malicious macOS samples.
https://objective-see.org/blog/blog_0x6E.html
Analyzing OSX.DazzleSpy
DazzleSpy is a fully-featured cyber-espionage macOS implant, installed via a remote Safari exploit!
https://objective-see.org/blog/blog_0x6D.html
The Mac Malware of 2021
It's here! Our annual report on all the Mac malware of the year (2021 edition). Besides providing samples for download, we cover infection vectors, persistence mechanisms, payloads and more!
https://objective-see.org/blog/blog_0x6B.html
Where's the Interpreter!?
CVE-2021-30853 was able to bypass file quarantine, gatekeeper, & notarization requirements. In this post, we show exactly why!
https://objective-see.org/blog/blog_0x6A.html
Made In America: Green Lambert for OS X
In this guest blog post, the security researcher Runa Sandvik analyzes OSX.GreenLambert, a first-stage macOS implant utilized by the CIA.
https://objective-see.org/blog/blog_0x68.html
Analysis of CVE-2021-30860
In this guest blog post, the security researcher Tom McGuire details the flaw and fix of CVE-2021-30860, a zero-click vulnerability, exploited in the wild.
https://objective-see.org/blog/blog_0x67.html
Made in China: OSX.ZuRu
Attackers are leveraging trojanized appplications to spread malware, via sponsored search results.
https://objective-see.org/blog/blog_0x66.html
OSX.Hydromac
In this guest blog post, the security researcher Taha Karim of ConfiantIntel, dives into a new macOS adware specimen: Hydromac.
https://objective-see.org/blog/blog_0x65.html
All Your Macs Are Belong To Us
This is our 100th blog post ...and it's a doozy! Here, we detail a bug that trivially bypasses many core Apple security mechanisms, leaving Mac users at grave risk!
https://objective-see.org/blog/blog_0x64.html
Creating Shield
In this guest blog post, the Mac security researcher Csaba Fitzl, descrbibes his journey creating an app to protect against process injection on macOS.
https://objective-see.org/blog/blog_0x63.html
Arm'd & Dangerous
Apple's new M1 systems offer a myriad of benefits, that malware authors are now leveraging. Here, we detail the first malicious program, compiled to natively target Apple Silicon (M1/arm64)!
https://objective-see.org/blog/blog_0x62.html
Discharging ElectroRAT
The first (macOS) malware of 2021 is an insidious remote access tool (RAT), containing a variety of embedded payload to extend its functionality.
https://objective-see.org/blog/blog_0x61.html
The Mac Malware of 2020
Our annual report on all the Mac malware of the year - including samples for download, infection vectors, persistence mechanisms, payloads and more!
https://objective-see.org/blog/blog_0x5F.html
Detecting SSH Activity via Process Monitoring
In this guest blog post, the noted Mac security researcher/author Jaron Bradley explains how to detect (potentially malicious) SSH activity...via process monitoring and the analysis of process hierarchies.
https://objective-see.org/blog/blog_0x5D.html
Adventures in Anti-Gravity (Part II)
Here we continue to deconstruct a Mac variant of GravityRAT (the cross-platform spyware, known to target the Indian armed forces), focusing on its Electron component.
https://objective-see.org/blog/blog_0x5C.html
Adventures in Anti-Gravity (Part I)
Here we deconstruct a Mac variant of GravityRAT (the cross-platform spyware, known to target the Indian armed forces).
https://objective-see.org/blog/blog_0x5B.html
Property List Parsing Bug(s)
In this guest blog post, the security researcher behind @OSCartography, describes a bug related to parsing property lists ...a bug that trivial crashed macOS!
https://objective-see.org/blog/blog_0x5A.html
FinFisher Filleted
Interested in learning about a macOS cyber-espionage implant ...that leveraged priv-escalation exploits and a kernel-mode rootkit!? In this post, we analyze the macOS version of FinSpy.
https://objective-see.org/blog/blog_0x4F.html
Apple Approved Malware
Unfortunately we didn't have to wait long before hackers found a way to (ab)use Apple's new notarization service to get their malware approved! In this post, we tear apart an adware campaign that utilized malicious payloads containing Apple's notarization "stamp of approval".
https://objective-see.org/blog/blog_0x4E.html
Office Drama on macOS
Even wondered how a system can be persistently infected by simply opening a document? In this post, I detail an exploit chain (created by yours truly), that was able fully infect a fully-patched macOS Catalina system, by simply opening a malicious (macro-laced) Office document ...no alerts, prompts, nor other direct user interactions required!
https://objective-see.org/blog/blog_0x4B.html
CVE-2020–9854: "Unauthd"
Security researcher Ilias Morad, describes an impressive exploit chain, combining three macOS logic bugs he uncovered in macOS. His exploit chain allowed a local user to elevate privileges all the way to ring-0 (kernel)!
https://objective-see.org/blog/blog_0x4D.html
CVE-2020–9934: Bypassing TCC for Unauthorized Access
In this guest blog post, security researcher Matt Shockley describes a lovely security vulnerability he uncovered in macOS. This bug allowed for a complete bypass of TCC's draconian entitlement checks, all without writing a single line of code!
https://objective-see.org/blog/blog_0x4C.html
Low-Level Process Hunting on macOS
Parent-child relationships are one of the simplest and most effective ways to detect malicious activity at the host level ...however on macOS things can get a little complex. Luckily security researcher Jaron Bradley is here to explain exactly what is going on!
https://objective-see.org/blog/blog_0x4A.html
OSX.EvilQuest Uncovered (part two)
OSX.EvilQuest is a new piece of malware targeting Mac users. In part two, we analyze the malware's viral infection capabilities, and detail its insidious capabilities.
https://objective-see.org/blog/blog_0x60.html
OSX.EvilQuest Uncovered (part one)
OSX.EvilQuest is a new piece of malware targeting Mac users. In part one, we analyze the malware's infection vector, persistence mechanism, and anti-analysis logic.
https://objective-see.org/blog/blog_0x59.html
Tiny SHell Under the Microscope
Tiny SHell is a lightweight backdoor used in APT attacks against Mac users. In this (guest) post, the noted macOS security researcher (and #OBTS speaker!) Jaron Bradley provides a comprehensive analysis!
https://objective-see.org/blog/blog_0x58.html