A new critical vulnerability has been discovered in Apple M1



The response from users to the first Macs based on the Apple M1 SoC was pretty good, but a few months after their release, reports began to surface of problems with the new platform.

Security researchers have discovered the first browser side-channel attack without JavaScript. At the same time, it has already been confirmed that new devices based on the Apple M1 SoC are vulnerable to this attack.

A new critical vulnerability in Apple M1

Researchers at Cornell University studied the effectiveness of disabling or limiting JavaScript to prevent or mitigate attacks. In the course of their research, they discovered a vulnerability that works even if the execution of the script is completely blocked in the browser.

The vulnerability allows attackers to monitor the user’s web activity. Moreover, this vulnerability can not only bypass JavaScript, but also ignore privacy technologies such as VPN or TOR.

The team tested Intel Core, AMD Ryzen, Samsung Exynos and Apple M1 platforms, all of which were vulnerable to the attack, although the researchers say the Apple M1 and Samsung Exynos SoCs are the most vulnerable.

This is the second vulnerability in the Apple M1 SoC in recent weeks. Last month, researchers discovered malware called Silver Sparrow.

Apple m1

An unknown malware infects Tens of thousands of Macs

While news of malware infections on Macs is relatively rare, new information about nearly 30,000 Macs infected is a matter of concern due to its complex nature and lack of information available.

Researchers at Red Canary have discovered a new type of macOS malware they dubbed Silver Sparrow. The malware is strange for many reasons, the main one being that it has remained largely inactive until now. Despite the fact that it exchanges data with the command and control servers once an hour; waiting for the execution of potentially malicious binaries, at the moment Silver Sparrow has not harmed infected computers.

 Macs and an unknown malware

In addition to the Intel x86_64 variant, an analog for the Apple M1 is avilable. Both versions contain “third-party observer binaries” that print “Hello World!” and “You did it!” Displaying such messages on the screen is not a…

Source…