If a couple of days ago a malware affecting the new Apple Silicon Macs with an M1 processor, Apple has already taken measures to prevent it from spreading and to end it permanently. There are probably a few software engineers in Apple Park who haven't slept for days.
So the malicious code named «Silver sparrow»That has been swarming around some Macs that mount Apple's new ARM processor, its days are numbered. Once again, bravo for Apple.
During this past weekend, we comment the appearance of a second malware code compiled to run natively on M1-based Macs. Under the name of "Silver Sparrow", it seems that this code takes advantage of the API MacOS Installer JavaScript to run some suspicious commands. However, after observing the malware for over a week, security firm Red Canary has not reported any final payload, so the exact threat to users remains a mystery.
However, Apple has reported that it has revoked the certificates of the developer accounts used to sign the packages, preventing more Macs drives from being infected. Apple has also explained that red canary has found no evidence to suggest that the malware delivered a malicious payload to devices that have already been infected.
For software downloaded outside of the Mac App Store, Apple has implemented "industry leading" mechanisms to protect users by detecting malware and blocking it from running. Since February 2020, for example, Apple has required that all Mac software distributed with a developer ID outside of the Mac App Store be shipped to the notarial service from Apple, an automated system that checks for malicious content and code signing problems.
It seems then that the Cupertino have taken action and have "Silver Sparrow" under control. There are many vested interests contrary to the success of the project Apple siliconAnd it is normal for it to be attacked "by land, sea and air."