Sabitlenmiş Tweet
Mickey Jin
301 posts

Mickey Jin
@patch1t
Exploring the world with my sword of debugger : )
Katılım Ağustos 2013
261 Takip Edilen5.3K Takipçiler

@mysk_co The CVE-2026-28910 requires the access to a protected plist file first, this shouldn’t be considered as a real vulnerability, in my humble opinion.
English

@mysk_co This one is similar to my CVE-2026-20633, patched in macOS 26.4 too. However, my bug doesn’t require any user interaction. I can’t disclose the details right now because I have already submitted a bypass report 🫣
English

📝🚨 New blog post: How a bug in Archive Utility allowed access to protected app data (including iMessage and WhatsApp chats, and Safari cookies) without any permissions.
The bug could also be exploited to hijack installed apps such as Signal and 1Password to perform phishing attacks.
Apple fixed the issue in macOS 26.4 as CVE-2026-28910, five months after we reported it.
mysk.blog/2026/05/19/cve…
English

My first CVE! 🎉🎉🎉
This is my non-write-up blog post about it:
blog.reversesociety.co/blog/2026/my-f…

English
Mickey Jin retweetledi

codecolor.ist/grapefruit/
Friday night product launch is not a good idea, but here is v1.0.0 release
npm i -g igf
Prebuilt single execuatbles are also available on GitHub release page. Please give a 🌟 if you like this tool, maybe I can beg for some free coding tokens with it

English
Mickey Jin retweetledi

Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices.
projectzero.google/2026/01/pixel-…
English
Mickey Jin retweetledi

Holiday Project 👨🏻💻🎄
Interested in macOS malware? Have a read!
Objective-See Foundation@objective_see
🎉 A decade of Mac malware research 🎉 Just published our 10th annual “The Mac Malware of <year>” report ...2025 edition! For each new sample of 2025, covers: 🔎 IoCs 💉 Infection 💾 Persistence 📡 Capabilities ☣️ Samples for download Dive in 👇 objective-see.org/blog/blog_0x84…
English
Mickey Jin retweetledi

@patch1t For clarification, none of this was a collaboration. It's just the result of both of our independently (and almost coincidentally) researching the same targets.
English
Mickey Jin retweetledi

Introducing DirtyDict. A series of vulnerabilities found by me and @patch1t.
Most of this is my perspective, but Mickey did give me permission to share some details about one of his bugs.
Enjoy!
wts.dev/posts/dirtydic…
English
Mickey Jin retweetledi

🎉 My new blog post is about a PackageKit vulnerability I learned from @p1tsist1p 's blog posts.
🍎🐛macOS LPE via the .localized directory
I tried convincing Apple to universally fix it with no luck.
Go hunt for vulnerable pkg installers! There is a ton :-( Happy Friday!
theevilbit.github.io/posts/localize…
English
Mickey Jin retweetledi

A really thorough overview of the research: github.com/trailofbits/ex…
English
Mickey Jin retweetledi

The slidedeck to our talk, Crash One: A Starbucks Story - CVE-2025-24277, with @gergely_kalman from @hexacon_fr and @objective_see #OBTS is available from the link below.
It was a macOS vulnerability impacting the crash reporting process where we could achieve LPE and sandbox escape.
theevilbit.github.io/talks_workshop…
English
Mickey Jin retweetledi

Excited to share our research on ChillyHell, a modular macOS backdoor targeting officials in Ukraine. Check out our write-up for more details.
jamf.com/blog/chillyhel…
English

@logiruse The vulnerable API implementation also affects iOS, but it is more difficult to exploit because the mount trick doesn’t work on iOS.
English

For those missing the talk,
Blog: jhftss.github.io/Exploiting-the…
Slides: github.com/jhftss/jhftss.…
Mickey Jin@patch1t
Will share one of them at the Nullcon Berlin @nullcon
English

It's time to disclose this vulnerability. What happens if gcore has …apple.security.system-task-ports.read entitlement? That exactly is the root cause of CVE-2025-24204.
tsunekoh@tsunek0h
My submission for #NullconBerlin2025 has been accepted! I will talk about the details of CVE-2025-24204, which breaks process isolation on macOS.
English







