CZ Warns Crypto Community of macOS and iPhone Exploit Targeting Users

CZ Warns Crypto Community of macOS and iPhone Exploit Targeting Users

Changpeng “CZ” Zhao, co-founder and former CEO of Binance, has raised concerns over a severe security exploit affecting Apple’s macOS and iPhone users. This zero-day vulnerability specifically targets Intel-based Macs, posing a significant threat to the cryptocurrency community and other security-conscious individuals.

Immediate Action Urged to Mitigate Risks

On November 19, CZ emphasized the importance of updating devices promptly to avoid potential breaches. The vulnerabilities, identified as CVE-2024-44308 and CVE-2024-44309, were discovered by Google’s Threat Analysis Group (TAG), which specializes in tracking state-backed cyber threats.

These flaws allow attackers to execute unauthorized code and launch cross-site scripting (XSS) attacks using compromised web content. While Apple has issued urgent patches to address these vulnerabilities, updates remain ongoing.

How These Vulnerabilities Operate

CVE-2024-44308: Exploiting JavaScriptCore

The CVE-2024-44308 vulnerability compromises the JavaScriptCore engine in macOS. It enables attackers to process maliciously crafted web content, allowing them to execute arbitrary code. This exploit can grant unauthorized access to user devices, enabling data theft, malware installation, and even full system control.

CVE-2024-44309: Weakness in WebKit Engine

The CVE-2024-44309 vulnerability targets Apple’s WebKit browser engine, used by Safari and other applications. Through XSS attacks, hackers can inject harmful scripts into trusted websites or apps. These scripts can steal sensitive information, hijack sessions, or redirect victims to phishing sites.

Apple has responded by implementing stricter state management protocols and additional checks in its latest updates for macOS Sequoia 15.1.1, iOS 18.1.1, and iOS 17.7.2. The company advises all users to update their devices immediately to mitigate risks.

Advanced Threats: State-Sponsored Groups and the Crypto Community

Experts suspect advanced threat actors, potentially linked to state-sponsored campaigns like the Lazarus Group, may be behind these exploits. Known for targeting cryptocurrency users, Lazarus recently carried out a sophisticated attack using a fake blockchain-based game to install spyware and steal wallet credentials. Their methods included leveraging zero-day vulnerabilities in Google Chrome’s V8 engine.

In another case earlier this year, LinkedIn users became victims of North Korean hackers posing as representatives of major corporations. More recently, browser extensions and video conferencing apps have also been targeted.

Implications for Cryptocurrency Users

Cryptocurrency users remain a primary focus of such cyberattacks due to the high financial stakes. Zero-day exploits can:

  • Extract private keys and steal wallet credentials.
  • Intercept crypto transactions.
  • Install keyloggers for tracking future activities.

Trust Wallet disclosed in April that hackers had used a high-risk zero-day exploit targeting iOS users via iMessage vulnerabilities. The exploit, sold on the Dark Web for $2 million, enabled unauthorized data access before Apple released emergency patches.

Staying Protected

The latest vulnerabilities underscore the need for heightened vigilance among cryptocurrency users and Apple device owners. Regular updates and caution against suspicious content are essential steps to safeguard digital assets and personal data

The post CZ Warns Crypto Community of macOS and iPhone Exploit Targeting Users appeared first on Cryptonews.

Share this article
0
Share
Shareable URL
Prev Post

Bitcoin ETFs record over $1 billion inflow in 2 days as new price peak boosts investments

Next Post

South Korea Names North Korea as Culprit Behind $41M Upbit Hack

Read next