Vulnerabilities in macOS Catches CZ's Attention
Apple has issued a critical patch addressing two zero-day vulnerabilities actively exploited by hackers targeting Intel-based Mac computers.
According to Apple's 19 November advisory, these flaws involve the processing of maliciously crafted web content, posing significant risks to users.
The urgency of the update drew attention from Changpeng Zhao (CZ), Binance's co-founder and former CEO, who urged users to act immediately by updating their systems to mitigate potential exposure to these exploits.
He later pointed out on X (formerly known as Twitter) that updating the phones is an important security fix.
Apple Rushes to Fix Exploit, Details Still Scarce
Apple has identified and patched two critical vulnerabilities actively exploited in the wild, labelled CVE-2024-44308 and CVE-2024-44309.
The first flaw, found in JavaScriptCore, allowed malicious code execution without user consent.
Apple resolved this issue by implementing improved validation checks.
The second vulnerability, rooted in the WebKit browser engine, enabled cross-site scripting attacks, allowing hackers to inject malicious code into websites or applications.
Apple attributed the flaw to a cookie management issue, which it addressed through enhanced state management.
As is standard practice, Apple withheld public disclosure of the vulnerabilities until thorough investigations were completed and patches deployed.
These zero-day exploits—named for the lack of time developers have to respond before exploitation begins—highlight the ongoing challenges of cybersecurity.
Details remain limited, with no confirmed information about the attackers, affected users, or the success rate of the attacks.
Apple was Just Recently Targeted
Google security researchers Clément Lecigne and Benoît Sevens, from the Threat Analysis Group, were credited with discovering the vulnerabilities in Apple's systems.
This group is known for countering government-backed cyberattacks, which raises suspicions that the source of this latest exploit may be a state actor, potentially one hostile to the tech giant.
Earlier this month, North Korea was implicated in targeting Apple users, with researchers uncovering a new malware campaign aimed at macOS users.
The attack employed phishing emails, fake PDF applications, and sophisticated methods to bypass Apple's security measures.
Notably, this marked the first instance of such a technique being used to compromise macOS, though it was unable to affect up-to-date systems.
In a related incident, North Korean hackers were also found exploiting a vulnerability in Google Chrome in October to steal cryptocurrency wallet credentials.