Unfortunately we didn’t have to wait long before hackers found a way to (ab)use Apple’s new notarization service to get their malware approved! In this post, we tear apart an adware campaign that utilized malicious payloads containing Apple’s notarization “stamp of approval”.
Print
Share
Comment
Cite
Upload
Translate
APA
() » Apple Approved Malware. Retrieved from https://www.truth.cx/2020/08/30/apple-approved-malware/.
MLA" » Apple Approved Malware." - , https://www.truth.cx/2020/08/30/apple-approved-malware/
HARVARD » Apple Approved Malware., viewed ,
VANCOUVER - » Apple Approved Malware. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2020/08/30/apple-approved-malware/
CHICAGO" » Apple Approved Malware." - Accessed . https://www.truth.cx/2020/08/30/apple-approved-malware/
IEEE" » Apple Approved Malware." [Online]. Available: https://www.truth.cx/2020/08/30/apple-approved-malware/. [Accessed: ]