

Though I don’t have access to the exploit code, the user was able to provide me with persistent malware the exploit installed on the system (named Finder.app). More than likely though, the attacker has moved on, and taken down the exploit site. Of course it’s possible that the site will only serve up (“throw”) the exploit if the user browses to the site via a vulnerable version of Firefox, or perhaps from a certain IP address, etc. The requested URL /nm603/awards/Adams_Prize was not found on this server.Īpache/2.4.7 (Ubuntu) Server at people.ds.cam.ac.uk Port 80 Unfortunately the link ( people.ds.cam.ac.uk/nm603/awards/Adams_Prize) currently returns a 404 Not Found: $ curl When individuals are targeted, the delivery mechanism of choice is often an email that contains links to a malicious site (which will “throw” the exploit when the user visits said site). We need your assistance in evaluating several projects for Adams Prize.Įven if an attacker has a browser 0day exploit, they still have to find a way to deliver it to the target. Our colleagues have recommended you as an experienced specialist in this
#Firefox for mac 51 update
I'm one of the Adams Prize Organizers.Įach year we update the team of independent specialists who could assess However now, more information is readily available!įirst, I was able to obtain an email that (said user claimed) was related to the attack. When the user contacted me, there wasn’t much information about the Firefox 0day exploit used in the attack.

…please don’t infect yourself! A Firefox 0day, a firefox 0day drops a macOS backdoor I’ve shared the sample (password: infect3d) Of course, given our mission at Digita, I was inherently intrigued and ready to get to work Let me know if you would be interested in analysing the binary, might be something interesting in there wrt bypassing osx gatekeeper. Last week Wednesday I was hit with an as-yet-unknown Firefox 0day that somehow dropped a binary and executed it on my mac (10.14.5) A little over a week ago, I received an email from a user who stated:
