Jamf Threat Labs | Jamf Blog https://www.jamf.com/blog/category/jamf-threat-labs/ The latest Jamf Threat Labs blog posts from Jamf en 2024-11-21T14:00:00+00:00 APT Actors Embed Malware within macOS Flutter Applications https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/ https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/ Jamf Threat Labs discovered malware samples believed to be tied to the Democratic People's Republic of Korea (DPRK), aka North Korea, that are built using Flutter, which by design provides obfuscation to the malicious code. JTL performs a deep dive into how the malicious code works to help protect users on macOS devices.

]]>
2024-11-12T13:00:00+00:00
Jamf After Dark: get to know Jamf Threat Labs https://www.jamf.com/blog/jamf-after-dark-get-to-know-jamf-threat-labs/ https://www.jamf.com/blog/jamf-after-dark-get-to-know-jamf-threat-labs/ Get an inside look at Jamf Threat Labs in this episode of Jamf After Dark.

]]>
2024-10-31T14:15:00+00:00
A Window into Your Photos: Revealing How Sideloaded Apps Can Secretly Monitor Your Images https://www.jamf.com/blog/jamf-threat-labs-how-sideloaded-apps-can-secretly-monitor-your-images/ https://www.jamf.com/blog/jamf-threat-labs-how-sideloaded-apps-can-secretly-monitor-your-images/ In the ever-evolving realm of cybersecurity, staying ahead of malicious threats is essential. At Jamf, we are committed to proactively identifying and mitigating risks to iOS devices. Learn how in our latest post.

]]>
2024-10-03T13:26:00+00:00
Jamf Threat Labs observes targeted attacks amid FBI Warnings https://www.jamf.com/blog/jamf-threat-labs-observes-targeted-attacks-amid-fbi-warnings/ https://www.jamf.com/blog/jamf-threat-labs-observes-targeted-attacks-amid-fbi-warnings/ On September 3, 2024 the Federal Bureau of Investigations (FBI) released a public service announcement set to warn those in the Crypto Industry that the Democratic People's Republic of Korea ("DPRK" aka North Korea) has been targeting individuals by using clever social engineering techniques for the successful delivery of malware.

]]>
2024-09-16T12:24:00+00:00
Bypassing the Gate: A closer look into Gatekeeper flaws on macOS https://www.jamf.com/blog/gatekeeper-flaws-on-macos/ https://www.jamf.com/blog/gatekeeper-flaws-on-macos/ Jamf Threat Labs discovered a Gatekeeper vulnerability in macOS that may lead to the execution of an unsigned and unnotarized application without displaying appropriate security prompts to the user. Read on to learn more about our findings.

]]>
2024-08-30T16:14:00+00:00
Maintaining persistence through deception: The threat of fake iOS updates https://www.jamf.com/blog/fake-ios-updates-security/ https://www.jamf.com/blog/fake-ios-updates-security/ Jamf Threat Labs explores how bad actors use fake iOS updates to maintain persistence on compromised devices.

]]>
2024-08-06T16:05:00+00:00
Phishing for credentials: iOS pop-up deception through sideloaded apps https://www.jamf.com/blog/phishing-for-credentials-ios-pop-up-deception-through-sideloaded-apps/ https://www.jamf.com/blog/phishing-for-credentials-ios-pop-up-deception-through-sideloaded-apps/

In this blog, Jamf Threat Labs showcases how malicious actors deceive users. By mimicking authentic Apple pop-up messages in the native iOS style, a false sense of security is created, prompting users to instinctively input their credentials.

]]>
2024-05-30T14:00:00+00:00
Infostealers continue to pose threat to macOS users https://www.jamf.com/blog/infostealers-pose-threat-to-macos/ https://www.jamf.com/blog/infostealers-pose-threat-to-macos/

Jamf Threat Labs dissects ongoing infostealer attacks targeting macOS users. Each with different means of compromising the victim’s Macs but with similar aims: to steal sensitive user data.

]]>
2024-04-05T15:40:00+00:00
Jamf Threat Labs discovers new malware embedded in pirated applications https://www.jamf.com/blog/jtl-malware-pirated-applications/ https://www.jamf.com/blog/jtl-malware-pirated-applications/

In this blog, Jamf Threat Labs researchers analyze malware they discovered in pirated macOS applications. These apps, appearing similar to ZuRu malware, download and execute multiple payloads to compromise machines in the background.

]]>
2024-01-18T14:27:00+00:00
Fake Lockdown Mode: A post-exploitation tampering technique https://www.jamf.com/blog/fake-lockdown-mode/ https://www.jamf.com/blog/fake-lockdown-mode/

In this blog, Jamf Threat Labs explains how bad actors could create a false sense of security with Lockdown Mode by post-exploit tampering.

]]>
2023-12-05T13:55:00+00:00
BlueNoroff strikes again with new macOS malware https://www.jamf.com/blog/bluenoroff-strikes-again-with-new-macos-malware/ https://www.jamf.com/blog/bluenoroff-strikes-again-with-new-macos-malware/

Jamf Threat Labs discovered a new later-stage malware variant from BlueNoroff that shares characteristics with their RustBucket campaign. Read this blog to learn more about this malware and view the indicators of compromise.

]]>
2023-11-06T15:19:00+00:00
A holistic approach to security: endpoint protection https://www.jamf.com/blog/endpoint-protection-apple-devices/ https://www.jamf.com/blog/endpoint-protection-apple-devices/

Comprehensive endpoint protection provides modern threat landscape protection to your entire fleet of Apple computers and mobile devices, including Windows and Android endpoints. By protecting against new and evolving threats through effective and efficient defense-in-depth strategies, Jamf endpoint security solutions are not only best-of-breed, but their powerful and flexible workflows help organizations like yours to succeed with Apple and mobile devices at work, without compromising data security, user privacy or end-user productivity.

]]>
2023-10-09T10:00:00+00:00
Mac Malware Mysteries:The Art of Cryptojacking https://www.jamf.com/blog/unveiling-mac-malware-mysteries/ https://www.jamf.com/blog/unveiling-mac-malware-mysteries/

The Jamf Threat Labs team recently drew attention in the tech media for uncovering a sly piece of malware that was proliferating unnoticed in the wild. As Jamf Threat Labs pursued its trail, they discovered intriguing insights and went down some fascinating rabbit holes. This fascinating JNUC 2023 presentation walked attendees through a recent Mac malware campaign investigation from start to finish.

]]>
2023-09-21T15:15:00+00:00
Fake Airplane Mode: A mobile tampering technique to maintain connectivity https://www.jamf.com/blog/fake-airplane-mode-a-mobile-tampering-technique-to-maintain-connectivity/ https://www.jamf.com/blog/fake-airplane-mode-a-mobile-tampering-technique-to-maintain-connectivity/

Jamf Threat Labs developed a post-exploit persistence technique on iOS 16 that falsely shows a functional Airplane Mode. In reality, after successful device exploit the attacker plants an artifical Airplane Mode that edits the UI to display Airplane Mode icons and cuts internet connection to all apps except the attacker application. This enables the attacker to maintain access to the device even when the user believes it is offline. This technique has not yet been observed in the wild and is only possible on an already exploited or jailbroken device.

]]>
2023-08-17T13:32:00+00:00
Jamf After Dark: WWDC recap https://www.jamf.com/blog/jamf-after-dark-wwdc-recap/ https://www.jamf.com/blog/jamf-after-dark-wwdc-recap/

Jamf After Dark co-hosts Kat Garbis and Sean Rabbitt welcomed special guest Aaron Webb, Senior Product Marketing Manager in security at Jamf for this special segment focusing on WWDC. They uncovered the benefits of same-day support, highlighted features, outlined how Jamf will support these features and discussed which markets stand to benefit most from these developments.

]]>
2023-07-03T16:24:00+00:00
Jamf protects against JokerSpy malware https://www.jamf.com/blog/jamf-protects-against-jokerspy-malware/ https://www.jamf.com/blog/jamf-protects-against-jokerspy-malware/

Threat actors targeted a cryptocurrency exchange in Japan, installing back doors and deploying spyware. Read more about the method of attack and Jamf's defense of the threat.

]]>
2023-06-30T13:28:00+00:00
The Mysteries Behind ColdIntro and ColdInvite: TL;DR edition https://www.jamf.com/blog/coldintro-coldinvite-ios-vulnerability-tldr/ https://www.jamf.com/blog/coldintro-coldinvite-ios-vulnerability-tldr/

Learn about the discovery of a novel threat vector on iPhone that allows attackers to circumvent security mitigations by exploiting under-protected co-processors, leveraging access to further compromise the iOS kernel.

]]>
2023-05-22T11:45:00+00:00
BlueNoroff APT group targets macOS with ‘RustBucket’ Malware https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/ https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/

Learn about the macOS malware variant discovered by Jamf Threat Labs named 'RustBucket'. What it does, how it works to compromise macOS devices, where it comes from and what administrators can do to protect their Apple fleet.

]]>
2023-04-21T13:00:00+00:00
The web of connections with iOS 16.4.1 https://www.jamf.com/blog/the-web-of-connections-with-ios-16-4-1/ https://www.jamf.com/blog/the-web-of-connections-with-ios-16-4-1/

In this blog, Jamf Threat Labs analyzes CVE-2023-28206, iOS 16.4.1 patches and CitizenLab’s findings on QuaDream’s exploits.

]]>
2023-04-19T16:00:00+00:00
Threat advisory: Mobile spyware continues to evolve https://www.jamf.com/blog/threat-advisory-mobile-spyware-continues-to-evolve/ https://www.jamf.com/blog/threat-advisory-mobile-spyware-continues-to-evolve/

Jamf Threat Labs examines two sophisticated spyware attacks and provides recommendations for organizations to defend users from increasingly complex threats.

]]>
2023-04-17T12:55:00+00:00
3CX Supply-chain attack https://www.jamf.com/blog/3cx-supply-chain-attack/ https://www.jamf.com/blog/3cx-supply-chain-attack/

Newly discovered supply-chain attack affecting 3CX softphone app used by millions of users globally. In this blog, the Jamf Threat Labs discusses how the app was compromised, what it does and how to go about detecting it on your network.

]]>
2023-03-31T20:00:00+00:00
MacStealer malware: A growing threat to macOS users https://www.jamf.com/blog/macstealer-malware-macos-threat/ https://www.jamf.com/blog/macstealer-malware-macos-threat/

MacStealer has been discovered and linked to a threat actor distributing it in the wild. The malicious code extracts a variety of files, browser cookies, and login information from a victim's system. Also, it collects end-user privacy and sensitive data, like credit card information from popular web browsers. Learn more about this new macOS malware variant and how Jamf Protect safeguards your devices, users and data from this emerging threat.

]]>
2023-03-30T17:00:00+00:00
Evasive cryptojacking malware targeting macOS found lurking in pirated applications https://www.jamf.com/blog/cryptojacking-macos-malware-discovered-by-jamf-threat-labs/ https://www.jamf.com/blog/cryptojacking-macos-malware-discovered-by-jamf-threat-labs/

Over the past few months Jamf Threat Labs has been following a family of malware that resurfaced and has been operating undetected, despite an earlier iteration being a known quantity to the security community. In this article, we’ll examine this malware and the glimpse it offers into the ongoing arms race between malware authors and security researchers as well as highlight the need for enhanced security on Apple devices to ensure their safe and effective use in production environments.

]]>
2023-02-23T13:45:00+00:00
Jamf Threat Labs analyzes the exploited in-the-wild WebKit vulnerability CVE-2022-42856 https://www.jamf.com/blog/webkit-vulnerability-cve-2022-42856-jamf-threat-labs-investigation/ https://www.jamf.com/blog/webkit-vulnerability-cve-2022-42856-jamf-threat-labs-investigation/

Jamf Threat Labs investigated a WebKit vulnerability that was exploited in the wild. Attackers can exploit CVE-2022-42856 to control code execution within WebKit, giving them the ability to read/write files. This blog explores what the vulnerability looked like in the code and the patches Apple applied.

]]>
2023-02-17T16:23:00+00:00
Get to know Aftermath: Jamf’s open-source incident response tool https://www.jamf.com/blog/aftermath-open-source-incident-response-tool/ https://www.jamf.com/blog/aftermath-open-source-incident-response-tool/

Your investigation into a security incident is only as good as the forensic data you collect. If that’s off, the entire incident response process will be a waste of time since it may not paint a complete picture of what happened and where. Enter Aftermath, the lightweight tool that knows where to look, helping you gather as much relevant data from the endpoint as quickly as possible to neutralize threats.

]]>
2022-10-14T14:00:00+00:00
Jamf Threat Labs identifies macOS Archive Utility vulnerability https://www.jamf.com/blog/jamf-threat-labs-macos-archive-utility-vulnerability/ https://www.jamf.com/blog/jamf-threat-labs-macos-archive-utility-vulnerability/

Jamf Threat Labs recently discovered a new macOS vulnerability in Archive Utility that could lead to the execution of an unsigned and unnotarized application without displaying security prompts to the user, by using a specially crafted archive. We reported our findings to Apple on May 31, 2022, and in macOS Monterey 12.5. Apple patched the vulnerability on July 20, 2022, assigning it CVE-2022-32910.

]]>
2022-10-05T13:00:00+00:00
Fake droids: Your new Android device is actually an old Android 6 https://www.jamf.com/blog/fake-droids-your-new-android-device-is-actually-an-old-android-6/ https://www.jamf.com/blog/fake-droids-your-new-android-device-is-actually-an-old-android-6/

During a digital forensices investigation, we found a cheap burner device that purported to be an Android 10 was actually and old Android 6. In this blog, we present how attackers can ‘fake’ the shutdown screen on iOS to achieve persistence.

]]>
2022-08-16T15:00:00+00:00
CloudMensis malware stealing your joy? Jamf’s got you covered! https://www.jamf.com/blog/cloudmensis-malware/ https://www.jamf.com/blog/cloudmensis-malware/

CloudMensis is a new macOS spyware discovered by ESET. Researchers noted that this malware’s primary goal is to exfiltrate data, such as documents, keystrokes, screen captures, emails and other potentially sensitive data.

]]>
2022-07-19T16:00:00+00:00
ChromeLoader adware halted from broadcasting by Jamf Protect https://www.jamf.com/blog/chromeloader-adware/ https://www.jamf.com/blog/chromeloader-adware/

The Jamf Threat Labs team recently updated the threat prevention rules in Jamf Protect to prevent the browser hijacking campaign that inject ads into Chrome and Safari browsers on macOS. Red Canary also published similar findings on the adware.

]]>
2022-06-09T15:30:00+00:00
‘No likes’ for iPhone phishing campaign on Instagram https://www.jamf.com/blog/iphone-phishing-scam-instagram/ https://www.jamf.com/blog/iphone-phishing-scam-instagram/

Attackers have gotten very good at knowing how to reach you. Sometimes they know your phone number, your email, your place of work, and your colleagues’ names and that would be enough to reach you with a compelling phishing campaign.

But now, thanks to the wafts of personal data changing hands online, attackers also know your interests. Just like brands using your behavior, interests, likes, dislikes and purchase history to target ads to you, attackers are using that information to craft attacks that might be more alluring. This means users are more likely to stumble upon online risks, especially when it comes to attacks distributed on social media where we are very accustomed to having a personalized experience.

]]>
2022-06-07T14:30:00+00:00
Jamf protects against CrateDepression malware https://www.jamf.com/blog/jamf-protects-against-cratedepression-malware/ https://www.jamf.com/blog/jamf-protects-against-cratedepression-malware/

SentinelOne researchers recently investigated a supply chain attack leveraging a malicious crate named ‘rustdecimal’ in the crates.io Rust community crate repository.

]]>
2022-06-03T14:00:00+00:00
Jamf protects against ‘pymafka’ malware https://www.jamf.com/blog/jamf-protects-against-pymafka-malware/ https://www.jamf.com/blog/jamf-protects-against-pymafka-malware/

Sonatype researchers recently identified a supply chain attack leveraging a malicious Python package ‘PyMafka’ in the PyPI registry.

]]>
2022-06-02T14:00:00+00:00
UpdateAgent Adapts Again https://www.jamf.com/blog/updateagent-adapts-again/ https://www.jamf.com/blog/updateagent-adapts-again/

The Jamf Threat Labs team has recently identified changes to the UpdateAgent malware dropper. These changes primarily focus on new executables written in Swift that reach out to a registration server to pull down a new set of instructions in the form of a bash script. Perhaps one of the most identifiable features of the malware is that it relies on the AWS infrastructure to host its various payloads and perform its infection status updates to the server. The continued development of this malware shows that its authors continue to remain active, trying to reach as many users as possible.

]]>
2022-05-16T14:30:00+00:00
NukeSped malware a dud, thanks to Jamf Protect https://www.jamf.com/blog/nukesped-malware-a-dud-thanks-to-jamf-protect/ https://www.jamf.com/blog/nukesped-malware-a-dud-thanks-to-jamf-protect/

Jamf protects against the most recent findings on Lazerous Group malware targeting macOS. CISA recently posted findings on a handful of malicious applications they refer to as TraderTraitor and many vendors detect as NukeSped malware.

]]>
2022-05-10T18:15:00+00:00
Jamf protects against oRAT malware https://www.jamf.com/blog/jamf-protects-against-orat-malware/ https://www.jamf.com/blog/jamf-protects-against-orat-malware/

Trend Micro researchers recently documented a new piece of malware by an APT threat actor named Earth Berberokawhich targets gambling websites.

]]>
2022-05-10T16:30:00+00:00
What is Jamf Threat Labs? https://www.jamf.com/blog/what-is-jamf-threat-labs/ https://www.jamf.com/blog/what-is-jamf-threat-labs/

Meet the team of experienced threat researchers, cybersecurity experts and data scientists focus on delivering the best, most secure experience to Jamf customers. And how the work of the Jamf Threat Labs helps organizations and users alike succeed with Apple, safely and securely.

]]>
2022-05-09T18:30:00+00:00
GooglePlay removes malware that steals Facebook credentials https://www.jamf.com/blog/googleplay-removes-malware-that-steals-facebook-credentials/ https://www.jamf.com/blog/googleplay-removes-malware-that-steals-facebook-credentials/

Jamf Threat Labs researchers investigated an Android app (that has since been removed from Google Play on March 22) that was capable of stealing Facebook login credentials (username and password) from users. The app is called Craftsart Cartoon Tools and it was also reported by researchers at Pradeo.

]]>
2022-04-08T20:16:00+00:00
Hunting Spring4Shell, another Java-based exploit https://www.jamf.com/blog/hunting-spring4shell-java-exploit/ https://www.jamf.com/blog/hunting-spring4shell-java-exploit/

A new vulnerability has been discovered within the Java Spring Framework which may allow for remote execution on a server. Jamf Threat Labs provides a primer on the Java-based vulnerability which has been assigned CVE-2022-22965 and given the nickname “Spring4Shell”.

]]>
2022-04-05T18:45:00+00:00
Jamf protects against Gimmick malware from pulling the strings on macOS https://www.jamf.com/blog/jamf-gimmick-malware-pulling-strings-macos/ https://www.jamf.com/blog/jamf-gimmick-malware-pulling-strings-macos/

Volexity researchers recently documented a new piece of malware, by a threat actor named Storm Cloud, that threatens to not only spy on Mac but use command & control (C2) protocols to manipulate your endpoints while operating from commercial, cloud-based services.

]]>
2022-03-25T14:30:00+00:00
Jamf Threat Labs identifies Safari vulnerability allowing for Gatekeeper bypass https://www.jamf.com/blog/jamf-threat-labs-safari-vuln-gatekeeper-bypass/ https://www.jamf.com/blog/jamf-threat-labs-safari-vuln-gatekeeper-bypass/

The Jamf Threat Labs recently discovered a new macOS vulnerability in the Safari browser that could lead to the execution of an unsigned and un-notarized application, without displaying security prompts to the user, by using a specially crafted zip file. We reported our findings to Apple and in the latest macOS release (12.3), Apple patched the vulnerability (CVE-2022-22616).

]]>
2022-03-17T14:30:00+00:00
Jamf Threat Labs research findings on cyber-warfare between Russia and Ukraine https://www.jamf.com/blog/jamf-threat-labs-ru-uk-cyber-findings/ https://www.jamf.com/blog/jamf-threat-labs-ru-uk-cyber-findings/

As the war between Russia and Ukraine continues, cybersecurity researchers identify the malicious threats that are occurring as cyber warfare unfolds. Virtually unseen by most, but affecting many, as malware variants, phishing campaigns, advanced persistent threats (APTs) and command & control (C2) attacks are unleashed, threatening to compromise the security of users on both sides.

]]>
2022-03-16T15:30:00+00:00
Jamf protects against NimbleMamba malware slithering about https://www.jamf.com/blog/protect-against-nimblemamba-malware/ https://www.jamf.com/blog/protect-against-nimblemamba-malware/

Jamf Threat Labs updates Jamf Threat Defense, preventing NimbaMamba from threatening your Windows devices.

]]>
2022-02-16T16:00:00+00:00
‘WizardUpdate’ malware recasts a malicious spell, yet still no match for Jamf Protect https://www.jamf.com/blog/wizardupdate-no-match-for-jamf-protect/ https://www.jamf.com/blog/wizardupdate-no-match-for-jamf-protect/

Jamf Threat Labs updates Jamf Protect to completely prevent UpdateAgent/WizardUpdate from threatening the security of your macOS fleet.

]]>
2022-02-11T17:00:00+00:00
Jamf protects against DazzleSpy backdoor malware making the rounds https://www.jamf.com/blog/jamf-protects-against-dazzlespy-backdoor-malware-making-the-rounds/ https://www.jamf.com/blog/jamf-protects-against-dazzlespy-backdoor-malware-making-the-rounds/

Jamf Threat Labs updates Jamf Protect to completely prevent DazzleSpy from threatening the security of your macOS fleet.

]]>
2022-01-26T19:30:00+00:00
Sysjoker Malware got you down? Jamf’s got you covered https://www.jamf.com/blog/sysjoker-malware-got-you-down-jamfs-got-you-covered/ https://www.jamf.com/blog/sysjoker-malware-got-you-down-jamfs-got-you-covered/

Jamf Threat Labs updates Jamf Protect to completely prevent SysJoker from threatening the security of your macOS fleet.

]]>
2022-01-13T16:30:00+00:00
Persistence without “persistence”: Meet the ultimate persistence bug “NoReboot” https://www.jamf.com/blog/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/ https://www.jamf.com/blog/persistence-without-persistence-meet-the-ultimate-persistence-bug-noreboot/

This blog explores "Noreboot" malware and how it persists on iPhones that appear to be off.

]]>
2022-01-04T16:00:00+00:00
How iOS malware can spy on users silently https://www.jamf.com/blog/how-ios-malware-can-spy-on-users-silently/ https://www.jamf.com/blog/how-ios-malware-can-spy-on-users-silently/

In this blog, we’ll demonstrate how mobile threat actors bypass the recently added camera & microphone green/orange indicators.

]]>
2021-11-04T15:00:00+00:00
Use-After-Free in Voice Control: CVE-2021-30902 Write-up - Jamf Threat Labs https://www.jamf.com/blog/use-after-free-in-voice-control-cve-2021-30902-write-up-jamf-threat-labs/ https://www.jamf.com/blog/use-after-free-in-voice-control-cve-2021-30902-write-up-jamf-threat-labs/

This post explores two common cases where crashes occur during the toggling of the voice control switch and provides a proof-of-concept demonstration of a race condition that can cause memory corruption and code execution.

]]>
2021-10-27T22:14:00+00:00
iOS 0-Click, CVE-2021-30860, sounds familiar. An unreleased write-up: one year later https://www.jamf.com/blog/the-recent-ios-0-click-cve-2021-30860-sounds-familiar-an-unreleased-write-up-one-year-later/ https://www.jamf.com/blog/the-recent-ios-0-click-cve-2021-30860-sounds-familiar-an-unreleased-write-up-one-year-later/

A 0-click vulnerability that was identified by Jamf Threat Labs is reproduced, alongside a breakdown of how it works and why it is critical to protect your iOS-based mobile fleet from CVE-2021-30860.

]]>
2021-09-14T17:25:00+00:00
Meet WiFiDemon: iOS 0-day/0-click vulnerability that was silently patched https://www.jamf.com/blog/meet-wifidemon-ios-wifi-rce-0-day-vulnerability-and-a-zero-click-vulnerability-that-was-silently-patched/ https://www.jamf.com/blog/meet-wifidemon-ios-wifi-rce-0-day-vulnerability-and-a-zero-click-vulnerability-that-was-silently-patched/

Jamf Threat Labs team investigates the 0-click vulnerability affecting Wi-Fi that permits remote code execution (RCE) if exploited, triggering a Denial of Service (DoS) attack, among others. In this blog, the researchers identify what makes the vulnerability possible, how it works and deep dive into the technical details, as well as how to fix the issue to keep your iOS-based fleet protected.

]]>
2021-07-17T17:17:00+00:00