{"id":18174,"date":"2021-04-01T15:54:45","date_gmt":"2021-04-01T11:54:45","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/apple-m1-malware\/18174\/"},"modified":"2021-04-01T15:54:45","modified_gmt":"2021-04-01T11:54:45","slug":"apple-m1-malware","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/apple-m1-malware\/18174\/","title":{"rendered":"Apple M1 Malware FAQ"},"content":{"rendered":"<p>A few months ago, Apple unveiled three series of computers powered by its own M1 chip, designed to replace Intel\u2019s processors. The chips are notable for being based on the ARM architecture instead of the x86 architecture traditionally used in personal computers. In essence, the Apple M1 is a direct relative of the iPhone and iPad processors. If everything goes according to plan, Apple will be able to switch completely to its own processors and unify its software under a single architecture.<\/p>\n<p>Leaving aside the current pros and cons performance-wise, we took a look at the innovation from a security perspective. Bad news: Just a few months after the release of the first Apple M1 computers, virus writers had already adapted several malware families to the new processor.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n<h2>What makes Apple M1 malware unique?<\/h2>\n<p>In terms of malicious functionality, absolutely nothing distinguishes M1 malware from \u201cregular\u201d malware. It can run natively on Mac computers with M1 chips, that\u2019s the difference. Developers recompiled their code and adapted the malware to the new architecture to make it work more efficiently. Essentially, the M1 adaptation drive is just more evidence that virus writers are motivated to keep their creations up to date.<\/p>\n<h2>Does that mean old malware doesn\u2019t work on computers with the Apple M1?<\/h2>\n<p>Unfortunately, malware adapted for M1 is an addition, not merely a replacement. Apple uses the <a href=\"https:\/\/support.apple.com\/en-us\/HT211861\" target=\"_blank\" rel=\"nofollow noopener\">Rosetta 2<\/a> system to make the transition from one platform to another seamless. Roughly speaking, it translates old program code written for the Intel x86 series into a form that the M1 can digest.<\/p>\n<p>Rosetta doesn\u2019t distinguish legitimate programs from malicious ones; it runs x86 malware as readily as any other app. But it is always more convenient to work without an intermediary, which is why some virus writers adapted their handiwork for the Apple M1.<\/p>\n<h2>Are older computers immune to M1 malware?<\/h2>\n<p>The new malicious programs for the Apple M1 are not fundamentally new; they\u2019re modifications of old ones. Cybercriminals tend to release the updated versions in a hybrid format, compatible with both platforms.<\/p>\n<h2>How many varieties of M1 malware are out there?<\/h2>\n<p>Our researchers have reliably identified four families already adapted for the M1. The first, known as XCSSET, infects Xcode projects and allows attackers to do all kinds of nasty stuff on the victim\u2019s Mac. The second is Silver Sparrow, which recently made a <a href=\"https:\/\/threatpost.com\/silver-sparrow-malware-30k-macs\/164121\/\" target=\"_blank\" rel=\"nofollow noopener\">media splash<\/a> and is spreading far faster than the first. The third and fourth known M1-malware varieties are adware from the Pirrit and Bnodlero families.<\/p>\n<p>Hardcore techies can check out our <a href=\"https:\/\/securelist.com\/malware-for-the-new-apple-silicon-platform\/101137\/\" target=\"_blank\" rel=\"nofollow noopener\">technical breakdown<\/a> of all four families.<\/p>\n<h2>How can you guard against M1 malware?<\/h2>\n<p>Probably the most important advice for Mac users is not to become complacent just because Apple devices are supposedly safer than others, and to adhere to all the usual rules of digital hygiene:<\/p>\n<ul>\n<li>Do not follow suspicious links;<\/li>\n<li>Do not download suspicious files or apps;<\/li>\n<li>Do not install apps from untrusted sources;<\/li>\n<li>Use <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable security solutions<\/a> that detect and neutralize this new breed of malware pests.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s the difference between the malware adapted for Apple\u2019s new M1 chip and the sort written for good old x86 processors.<\/p>\n","protected":false},"author":2548,"featured_media":18175,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[14,1328,521],"class_list":{"0":"post-18174","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-apple","9":"tag-macos","10":"tag-threats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/apple-m1-malware\/18174\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/apple-m1-malware\/22691\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/apple-m1-malware\/24483\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/apple-m1-malware\/22525\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/apple-m1-malware\/21560\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/apple-m1-malware\/25018\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/apple-m1-malware\/24290\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/apple-m1-malware\/30365\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/apple-m1-malware\/9497\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/apple-m1-malware\/39180\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/apple-m1-malware\/16699\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/apple-m1-malware\/17276\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/apple-m1-malware\/14638\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/apple-m1-malware\/26476\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/apple-m1-malware\/30369\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/apple-m1-malware\/26865\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/apple-m1-malware\/23723\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/apple-m1-malware\/29066\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/apple-m1-malware\/28863\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/macos\/","name":"macOS"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2548"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=18174"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/18174\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/18175"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=18174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=18174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=18174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}