	{"id":631,"date":"2009-01-21T10:10:08","date_gmt":"2009-01-21T09:10:08","guid":{"rendered":"http:\/\/blog.intego.com\/?p=631"},"modified":"2009-01-21T10:10:08","modified_gmt":"2009-01-21T09:10:08","slug":"a-new-type-of-mac-attack-on-the-horizon","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/","title":{"rendered":"A New Type of Mac Attack on the Horizon"},"content":{"rendered":"<p>According to <a href=\"http:\/\/www.theregister.co.uk\/2009\/01\/21\/stealthier_mac_attacks\/\">The Register<\/a>, a security researcher has found a new way to attack Macs by injecting hostile code directly into memory, rather than by installing files that leave traces. While malware generally installs files, which then act on a computer, this new attack allows hackers to send, via a network vulnerability, malicious commands and information which will never be stored on a Mac. When it goes into the memory of a running application, the code is active as long as the application is, and can eventually reproduce itself in other running applications. <\/p>\n<p>The technique, discovered by Vincenzo Iozzo, and to be presented at next month&#8217;s Black Hat security conference, &#8220;allows someone to execute a binary completely within the OS X application or process that&#8217;s being attacked. That means the operating system doesn&#8217;t need to open a new process and the exploit code need not ever touch the hard disk of the infected machine,&#8221; the article says. (Note that while the code may be written to virtual memory swap files, it will not be stored on the computer&#8217;s hard disk in file format.) <\/p>\n<p>Attacks using this technique will still need to exploit a vulnerability in an application that has access to the Internet, such as Safari or QuickTime, but if it gets through those cracks, it could do serious damage. Since Apple is notoriously slow in issuing security updates, there&#8217;s a real potential that this type of attack can harm man Macs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to The Register, a security researcher has found a new way to attack Macs by injecting hostile code directly into memory, rather than by installing files that leave traces. While malware generally installs files, which then act on a computer, this new attack allows hackers to send, via a network vulnerability, malicious commands and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"According to The Register, a security researcher has found a new way to attack Macs by injecting hostile code directly into memory, rather than by\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A New Type of Mac Attack on the Horizon - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"According to The Register, a security researcher has found a new way to attack Macs by injecting hostile code directly into memory, rather than by\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-01-21T09:10:08+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/\",\"name\":\"A New Type of Mac Attack on the Horizon - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2009-01-21T09:10:08+00:00\",\"dateModified\":\"2009-01-21T09:10:08+00:00\",\"description\":\"According to The Register, a security researcher has found a new way to attack Macs by injecting hostile code directly into memory, rather than by\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A New Type of Mac Attack on the Horizon\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"A New Type of Mac Attack on the Horizon\",\"datePublished\":\"2009-01-21T09:10:08+00:00\",\"dateModified\":\"2009-01-21T09:10:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#webpage\"},\"wordCount\":251,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"According to The Register, a security researcher has found a new way to attack Macs by injecting hostile code directly into memory, rather than by","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/","og_locale":"en_US","og_type":"article","og_title":"A New Type of Mac Attack on the Horizon - The Mac Security Blog","og_description":"According to The Register, a security researcher has found a new way to attack Macs by injecting hostile code directly into memory, rather than by","og_url":"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-01-21T09:10:08+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/","name":"A New Type of Mac Attack on the Horizon - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2009-01-21T09:10:08+00:00","dateModified":"2009-01-21T09:10:08+00:00","description":"According to The Register, a security researcher has found a new way to attack Macs by injecting hostile code directly into memory, rather than by","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"A New Type of Mac Attack on the Horizon"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"A New Type of Mac Attack on the Horizon","datePublished":"2009-01-21T09:10:08+00:00","dateModified":"2009-01-21T09:10:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/a-new-type-of-mac-attack-on-the-horizon\/#webpage"},"wordCount":251,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ab","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/631"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=631"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/631\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}