{"id":190920,"date":"2024-06-09T20:24:40","date_gmt":"2024-06-10T01:24:40","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2024\/06\/lightspy-spywares-macos-variant-found-with-advanced-surveillance-capabilities"},"modified":"2024-06-09T20:24:40","modified_gmt":"2024-06-10T01:24:40","slug":"lightspy-spywares-macos-variant-found-with-advanced-surveillance-capabilities","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2024\/06\/lightspy-spywares-macos-variant-found-with-advanced-surveillance-capabilities","title":{"rendered":"LightSpy Spyware\u2019s macOS Variant Found with Advanced Surveillance Capabilities"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/lightspy-spywares-macos-variant-found-with-advanced-surveillance-capabilities2.jpg\"><\/a><\/p>\n<p>Cybersecurity researchers have disclosed that the LightSpy spyware recently identified as targeting Apple iOS users is in fact a previously undocumented macOS variant of the implant.<\/p>\n<p>The findings come from both <a href=\"https:\/\/www.huntress.com\/blog\/lightspy-malware-variant-targeting-macos\" rel=\"noopener\" target=\"_blank\">Huntress Labs<\/a> and <a href=\"https:\/\/www.threatfabric.com\/blogs\/lightspy-implant-for-macos\" rel=\"noopener\" target=\"_blank\">ThreatFabric<\/a>, which separately analyzed the artifacts associated with the cross-platform malware framework that likely possesses capabilities to infect Android, iOS, Windows, macOS, Linux, and routers from NETGEAR, Linksys, and ASUS.<\/p>\n<p>\u201cThe Threat actor group used two publicly available exploits (CVE-2018\u20134233, CVE-2018\u20134404) to deliver implants for macOS,\u201d ThreatFabric said in a report published last week. \u201cPart of the CVE-2018\u20134404 exploit is likely borrowed from the Metasploit framework. macOS version 10 was targeted using those exploits.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have disclosed that the LightSpy spyware recently identified as targeting Apple iOS users is in fact a previously undocumented macOS variant of the implant. The findings come from both Huntress Labs and ThreatFabric, which separately analyzed the artifacts associated with the cross-platform malware framework that likely possesses capabilities to infect Android, iOS, Windows, [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,6,1511],"tags":[],"class_list":["post-190920","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-robotics-ai","category-surveillance"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/190920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=190920"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/190920\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=190920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=190920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=190920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}