Opens profile photo
Follow
Patrick Wardle
@patrickwardle
Founder of the Objective-See Foundation 🛠️🍎
Maui, HIobjective-see.orgJoined October 2013

Patrick Wardle’s Tweets

Pinned Tweet
RE: The 3CX VOIP supply chain attack, vendors have stated that macOS was also targeted - but I couldn't find any specific technical details (yet) 🍎🐛☠️ One vendor stated, "we cannot confirm that the Mac installer is similarly trojanized" ...let's dive in! 1/n 🧵
14
592
Show this thread
And speaking of the supply chain attack, I'm stoked at the opportunity to talk more about this at 🤩 Specifically diving into the technical details of the three unique macOS payloads used in what many are calling the first "chained" supply chain attack🍎🐛🐛
Image
Quote Tweet
Image
The @3CX supply chain attack resulted in trojanized installers signed w/ @3CX's Dev ID which were then naively notarized by @Apple 🤦🏻‍♂️ TIL, Apple did not revoke @3CX's signing cert just the notarization ticket of the installer(s) 👀 So technically they're still validly signed 🔐
Show this thread
11
But, what if you want to check an items status programmatically? You can use the undocumented SecAssessmentTicketLookup API, passing in the item's truncated SHA256 cdhash. If the API fails, and the error is EACCES, you know the ticket has been revoked!
Image
1
7
Show this thread
Of course, macOS also checks the notarization status before running an item, and thus will now prevent the infected installers from running, as the ticket has been revoked. You can manually check the notary status of an item via spctl -a -vv <path> or stapler validate <path>
Image
1
4
Show this thread
The supply chain attack resulted in trojanized installers signed w/ 's Dev ID which were then naively notarized by 🤦🏻‍♂️ TIL, Apple did not revoke 's signing cert just the notarization ticket of the installer(s) 👀 So technically they're still validly signed 🔐
Image
3
63
Show this thread
Really stoked about the amazing programs we're able to support via "Objective-We" 🥰 Thanks again to , our sole platinum-level "Friend of Objective-See" for their vision, support & commitment to the Foundation and "Objective-We" program 🙏🏽
Quote Tweet
Our "Objective-We" program (objective-see.org/we.html) is working to make the macOS space more inclusive & accessible to everyone! 🥰 Thru this program we're funding scholarships for @ekoparty's Hackademy (ekoparty.org/hackademy/) Big mahalo to our (platinum) supporter @KandjiMDM
Image
16
Square profile picture
In this guide, we used the intentionally vulnerable iOS application known as DVIA-2 to show how sensitive information can be missed when performing app security assessments. Take a deeper look at databases for #iOS applications and how they work.
25
Enjoyed reading about latest macOS bugs! ...though seems Apple still struggles to effectively patch issues, often (inadvertently) introducing more bugs via the "patch" 🤦🏻‍♂️
Image
Quote Tweet
New blog post here: CVE-2022-32902: Patch One Issue and Introduce Two jhftss.github.io/CVE-2022-32902
1
42
For #OSINT Macos users, I can recommend to also check out 's other tools. TY 🙏
Quote Tweet
Replying to @OSINT_Tactical @OSINT_Research and @Sector035
Yes, there is functional overlap. OverSight precedes macOS' mic/cam protection, and also supports additional features (e.g., run a custom script when activity detected). Also has been able to detect bypasses of Apple's mic/cam protections: twitter.com/patrickwardle/
5
This is another sample of #Lazarus #APT part of this campaign: twitter.com/ESETresearch/s It is a malicious PDF reader for #macOS 3f6566477e496c573e4e90acd15f242980cfdf5f27903a0eac287b05380b7132 Spirit Blockchain Capital 2023 - Pitch Deck\.zip
Image
Image
Image
Quote Tweet
Image
#ESETResearch warns about a CPIO archive named “Jump Crypto Investment Agreement.zip” uploaded to VirusTotal from the USA 🇺🇸. It is another malicious PDF viewer distributed by #Lazarus #APT for #macOS twitter.com/jbradley89/sta @pkalnai @michalmalik 1/7
Show this thread
6
65
Show this thread