{"id":100220,"date":"2024-11-21T01:47:04","date_gmt":"2024-11-21T05:47:04","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=100220"},"modified":"2024-11-21T01:47:08","modified_gmt":"2024-11-21T05:47:08","slug":"apple-issues-patch-fixing-for-zero-day-attacks","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/apple-issues-patch-fixing-for-zero-day-attacks\/","title":{"rendered":"Apple Issues Patch Fixing  for Zero-day Attacks on MacOS"},"content":{"rendered":"\n<p>Apple has issued a patch to address two zero-day vulnerabilities that hackers have exploited to gain access to Intel-based <a href=\"https:\/\/coinscreed.com\/staging\/openais-ai-integration-into-ios-macos-fuels-excitement.html\" data-type=\"post\" data-id=\"79893\">MacOS Systems<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/04\/APPLE-1.webp\" alt=\"Apple Issues Patch Fixing  for Zero-day Attacks on MacOS \" class=\"wp-image-48505\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/04\/APPLE-1.webp 1000w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/04\/APPLE-1-300x200.webp 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/04\/APPLE-1-768x512.webp 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/04\/APPLE-1-750x500.webp 750w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Apple Issues Patch Fixing  for Zero-day Attacks on MacOS <\/figcaption><\/figure>\n\n\n\n<p>Both vulnerabilities have been &#8220;actively exploited&#8221; and involve the &#8220;processing maliciously crafted web content,&#8221; as stated in the Apple advisory from November 19.<\/p>\n\n\n\n<p>The vulnerabilities even piqued the interest of Changpeng &#8220;CZ&#8221; Zhao, the co-founder and former CEO of Binance. Zhao warned users to update their technology promptly to prevent exploitation.<\/p>\n\n\n\n<p>&#8220;If you are using a Macbook with an Intel-based chip, please update quickly!&#8221; he advised.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"879\" height=\"750\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/11\/image-34.png\" alt=\"Source: Changpeng Zhao\" class=\"wp-image-100223\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/11\/image-34.png 879w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/11\/image-34-300x256.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/11\/image-34-768x655.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2024\/11\/image-34-860x734.png 860w\" sizes=\"(max-width: 879px) 100vw, 879px\" \/><figcaption class=\"wp-element-caption\"><em>Source:\u00a0<\/em><a href=\"https:\/\/x.com\/cz_binance\/status\/1859287351757078958\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Changpeng Zhao<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a><\/figcaption><\/figure>\n\n\n\n<p>Apple has identified one of the vulnerabilities as CVE-2024-44308. This vulnerability could cause JavaScriptCore software to execute malicious code without the user's knowledge or consent. Apple stated that the matter was resolved by implementing enhanced verification procedures.<\/p>\n\n\n\n<p>The second vulnerability, CVE-2024-44309, has the potential to result in a &#8220;cross-site scripting attack&#8221; by exploiting <a href=\"https:\/\/webkit.org\/\" target=\"_blank\" data-type=\"post\" data-id=\"74170\" rel=\"noreferrer noopener nofollow\">Apple's WebKit browser engine<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a>. <\/p>\n\n\n\n<p>Hackers may introduce malicious computer code into other websites or applications currently in use due to this cyberattack.<\/p>\n\n\n\n<p>Apple stated this was a &#8220;cookie management issue&#8221; resolved through &#8220;improved state management.&#8221;<\/p>\n\n\n\n<p>The tech giant did not &#8220;disclose, discuss, or confirm&#8221; the flaws until it had investigated and developed a patch to address them, as is frequently the case.<\/p>\n\n\n\n<p>A zero-day flaw is an error or vulnerability that hackers exploit before the software developer can patch or address the issue, allowing them &#8220;zero days&#8221; to resolve it.<\/p>\n\n\n\n<p>Additional information is scarce. Who is responsible for the breach, the number of users affected, and the success rate of any cyberattacks are all unknown.<\/p>\n\n\n\n<p>The bugs were discovered by Cl\u00e9ment Lecigne and Beno\u00eet Sevens, Google security researchers, according to the technology behemoth.<\/p>\n\n\n\n<p>The Threat Analysis Group of the firm, which is responsible for combating government-sponsored hacking and attacks against Google, is the source of both. This suggests that an unfriendly government may be the culprit in this instance.<\/p>\n\n\n\n<p>Apple consumers were the focus of North Korea's recent campaign. On November 12, researchers discovered that <a href=\"https:\/\/coinscreed.com\/staging\/north-korean-hackers-hack-chrome-with-fake-nft.html\" data-type=\"post\" data-id=\"97400\">North Korean hackers<\/a> were employing a new malware campaign to target macOS users. The campaign involved phishing emails, phony PDF applications, and a method to circumvent Apple's security checks.<\/p>\n\n\n\n<p>According to the researchers, this was the first instance in which they had observed this type of technology being employed to compromise Apple's macOS operating system. However, they discovered that it was incompatible with modern systems.<\/p>\n\n\n\n<p>In October, North Korean hackers were also captured exploiting a vulnerability in Google's Chrome to steal crypto wallet credentials.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has issued a patch to address two zero-day vulnerabilities that hackers have exploited to gain access to Intel-based MacOS Systems. Both vulnerabilities have been &#8220;actively exploited&#8221; and involve the &#8220;processing maliciously crafted web content,&#8221; as stated in the Apple advisory from November 19. The vulnerabilities even piqued the interest of Changpeng &#8220;CZ&#8221; Zhao, the [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":48505,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9],"tags":[408,17060,22956,22957],"class_list":["post-100220","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-apple","tag-macos","tag-patch-fixing","tag-zero-day-attack"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/04\/APPLE-1.webp","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/100220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=100220"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/100220\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/48505"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=100220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=100220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=100220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}