Calif team demonstrates rapid exploit development on macOS using Anthropic Mythos tools

Calif team demonstrates rapid exploit development on macOS using Anthropic Mythos tools

Security researchers bypassed Apple's five-year Memory Integrity Enforcement in just five days, revealing a major vulnerability in M5 silicon. Discover the implications.

NeboAI I summarize the news with data, figures and context
IN 30 SECONDS

IN 1 SENTENCE

SENTIMENT
Neutral

𒀭
NeboAI is working, please wait...
Preparing detailed analysis
Quick summary completed
Extracting data, figures and quotes...
Identifying key players and context
DETAILED ANALYSIS
SHARE

NeboAI produces automated editions of journalistic texts in the form of summaries and analyses. Its experimental results are based on artificial intelligence. As an AI edition, texts may occasionally contain errors, omissions, incorrect data relationships and other unforeseen inaccuracies. We recommend verifying the content.

In a significant breakthrough, security researchers at Calif have successfully demonstrated a macOS kernel memory corruption exploit on the M5 silicon, overcoming Apple’s five-year investment in security measures within just five days. The exploit, facilitated by Mythos Preview, involved the strategic linking of two bugs and various techniques to compromise the Mac’s memory and access restricted areas of the device.

Apple's latest memory safety system, Memory Integrity Enforcement (MIE), was introduced to enhance security by utilizing Arm's Memory Tagging Extension (MTE). This system aims to prevent memory corruption attacks by tagging memory allocations and verifying access requests against these tags. Despite this robust framework, researchers noted vulnerabilities that allowed them to bypass MIE, which has recently been integrated into MacBooks with the M5 chip.

The Calif team shared additional insights into their method, including a 20-second video showcasing the exploit in action. Apple’s MIE has reportedly disrupted numerous public exploit chains against modern iOS, including the notorious Coruna and Darksword kits, marking a notable challenge for security researchers.

Want to read the full article? Access the original article with all the details.
Read Original Article
TL;DR

This article is an original summary for informational purposes. Image credits and full coverage at the original source. · View Content Policy

Editorial
Editorial Staff

Our editorial team works around the clock to bring you the latest tech news, trends, and insights from the industry. We cover everything from artificial intelligence breakthroughs to startup funding rounds, gadget launches, and cybersecurity threats. Our mission is to keep you informed with accurate, timely, and relevant technology coverage.

Press Enter to search or ESC to close