And it's a fat binary with code for both x86-64 and ARM64 chips, indicating it was created to run on Macs rather than iOS devices. It's a derivation of the older Pirrit adware, first spotted in 2016 and still plaguing Macs. He got more than 200 results, but most were for iOS jailbreaking software that was built to run on both older and newer iPhone/iPad chips. So he searched in the online VirusTotal database for malware that met all the right parameters.Īmong other things, it had to be written for macOS or iOS, contain ARM64 instructions, support more than one chip architecture, be digitally "signed" by an Apple developer and be detected as malware by at least two antivirus engines. Wardle wondered if any known malware was secretly using fat binaries that hadn't yet been spotted. MacOS will select whichever set is appropriate for that particular machine. That's why Mac developers are scrambling to include code built for both chip architectures in their software, resulting in "fat" or "multi-architecture" applications that contain two complete sets of binary data. But it won't run as fast as software written natively for M1. Most Mac software written for Intel chips will be translated by macOS Big Sur to run on the M1 chip. Instead, the M1 is closely related to the A13 and A14 chips used on the most recent iPhones and iPads, and more distantly to chips used on Android devices and on earlier iPhones.
0 Comments
Leave a Reply. |