Apple is trying to prevent the spread of silver sparrow via Mac devices
Apple said: It has taken steps to prevent the prevalence of harmful code known as Silver Sparrow via M1 operating devices.
The company explained that it had completed safety certificates for developers' accounts used to sign packages, which prevents its installation through any other Mac devices.
In addition to cancel the certificate, Apple indicates that they also use many protection and protection programs in their products and services, with deployment of regular software updates that can prevent threats from influence.
Apple's movements come to minimize any effect that can occur in the future, as Silver Sparrow is forced with the Mac system infected to check the control server once per hour.
Apple explained that the harmful code has not yet been provided by any malicious code so far and all the programs were downloaded outside Mac App Store provides a leader in industry for users.
Apple requires documenting all programs, whether downloaded from APP STORE or from another place.
Approximately 30,000 Mac computer wounded by the harmful code Silver Sparrow, according to researchers at Red Canary Security.
Tony Lambert, analyst at Red Canary, said that the harmful code does not display the expected behaviors of the usual adware that often targeted Macos systems.
It is not clear what is the goal of malware, which includes a self-destructive mechanism that may remove any impact, and it seems not used, and is unclear, which can lead to activating this post.
It is worth mentioning that Silver Sparrow contains code is originally operated across the M1 slide from Apple, which was released in November, making it a well-known malicious code that you do.
The researchers wrote:
Although we did not note that Silver Sparrow offers additional harmful parts so far, but agreed with the M1 slice, global access, and the relatively high infection rate, and the operating maturity indicates that Silver Sparrow represents a serious threat.
SILVER SPARROW hit 153 countries from February 17, with higher concentrations in the United States, the United Kingdom, Canada, France and Germany, according to data from MalwareBytes, which prevents ransom attacks.