Patrick Wardle

10.4K posts

Patrick Wardle banner
Patrick Wardle

Patrick Wardle

@patrickwardle

🛠 🍎 👾 Objective-See'ing & DoubleYou'ing

Maui, HI Katılım Ekim 2013
983 Takip Edilen40.6K Takipçiler
Sabitlenmiş Tweet
Patrick Wardle
Patrick Wardle@patrickwardle·
Stoked for the next (ad)venture: "DoubleYou" techcrunch.com/2024/04/25/ex-… Cofounded w/ long-time friend @hexlogic, we're empowering those building security tools for Apple devices 🍎🛡️ And by bootstrapping this venture, our core value of democratizing security remains our focus!
English
20
31
183
41.8K
Calif
Calif@calif_io·
Early this week, we had a meeting at Apple Park in Cupertino. While there, we also shared with Apple our latest vulnerability research report: the first public macOS kernel memory corruption exploit on M5 silicon, surviving MIE. It was laser printed, in honor of our hacker friends. Full story: open.substack.com/pub/calif/p/fi…
Calif tweet media
English
8
55
348
73.3K
Patrick Wardle retweetledi
Gergely Kalman
Gergely Kalman@gergely_kalman·
I'll also be there, so sign up if you want to learn some filesystem trickery
Patrick Wardle@patrickwardle

Super stoked for #OFTW v4! Two days of hands-on training + talks for students / those getting into 🍎 security… all free! A few spots left, so don’t wait to apply! A big mahalo to @andyrozen and to @HPI_DE for hosting 🙏🏽

English
0
1
6
1.6K
Patrick Wardle retweetledi
Moonlock Lab
Moonlock Lab@moonlock_lab·
1/🚨 New stealer sample on #macOS, with codebase related to #Banshee variants. No code signature. Only one detection on VirusTotal at time of analysis. Shared by @malwrhunterteam. It disguises itself as a "System and filesystem monitor daemon" and goes straight for crypto wallets, credentials, and browser data. Read more below👇
Moonlock Lab tweet media
English
3
15
54
6.8K
Patrick Wardle retweetledi
Berk Albayrak
Berk Albayrak@brkalbyrk7·
🚨 macOS malware warning🍎: Attackers are abusing Google Ads and legitimate claude.ai shared chats to distribute a #MacSync malware variant via fake “Claude Code on Mac” install steps. The flow: User searches “Claude download mac” on Google, ... @AnthropicAI
Berk Albayrak tweet mediaBerk Albayrak tweet mediaBerk Albayrak tweet media
English
2
15
72
5.6K
Patrick Wardle retweetledi
Berk Albayrak
Berk Albayrak@brkalbyrk7·
It's really hard for the end user to avoid downloading malware, even the first two ads are #Clickfix and downloading macOS stealers. sites[.]google[.]com/view/cloud-version-08 Content -> 2[.]26[.]75[.]112/Hokojol claude-desktop-app[.]framer[.]ai Content -> greenactiv[.]com
Berk Albayrak tweet mediaBerk Albayrak tweet mediaBerk Albayrak tweet media
Who said what?@g0njxa

Friendly reminder: do NOT blindly trust MacOS related sponsored results on search engine leading to malicious websites delivering MacSync clickfix payloads🕵️🍎 sites[.]google[.]com/view/brewshka-page Content -> pieoneer[.]org sites[.]google[.]com/view/claud-version-0505 Content -> clavdiydetka[.]com MacSync C2 - oklahomawarehousing[.]com

English
0
11
50
7.3K
Patrick Wardle retweetledi
Moonlock Lab
Moonlock Lab@moonlock_lab·
UPD: Our previous post had visual inconsistencies, so we decided to re-upload it with the correct imagery. 1/ We're tracking new #Odyssey #macOS #stealer activity, and this one comes with a twist in delivery: the malicious script is embedded directly into a PLIST file. Key indicators of compromise include "/api/v1/bot/repeat/" with "socks" and "joinsystem" strings. The "socks" component suggests the malware may be turning infected machines into proxy nodes - not just stealing data, but potentially building a botnet-style relay infrastructure. More geo-info below 👇
Moonlock Lab tweet media
English
1
5
25
2.4K
Patrick Wardle retweetledi
Olivia Gallucci ✨
Olivia Gallucci ✨@OliviaGalluccii·
¡Es un honor compartir que asistiré a @Ekoparty para hablar sobre la investigación de vulnerabilidades asistida por IA en sistemas operativos! 🌴 Gracias, @g0njxa, por ayudarme a escribir este mensaje 😁
Olivia Gallucci ✨ tweet media
Español
1
4
33
2.2K
Patrick Wardle
Patrick Wardle@patrickwardle·
Super stoked for #OFTW v4! Two days of hands-on training + talks for students / those getting into 🍎 security… all free! A few spots left, so don’t wait to apply! A big mahalo to @andyrozen and to @HPI_DE for hosting 🙏🏽
Objective-See Foundation@objective_see

The lineup for our (free!) "Objective for the We" (#OFTW) v4 is out! 🔥 July 30–31st in Berlin, it will feature @Helthydriver @bellis1000 @Fox0x01 @osint_barbie @naehrdine @patrickwardle + more 🧠 Student or getting into 🍎-security? Apply to attend: objective-see.org/oftw/v4.html

English
0
3
18
4.5K
Patrick Wardle retweetledi
xiu
xiu@osint_barbie·
🧵Found something yummy. #macOS #malware packed with PyInstaller, 1 detection on VT. Could be testing phase, could be red team. Either way, it's packed with capabilities. Let me break it down 👇 packed: 5d40c757c85814b86733d66ffc9e325b1007ac98513a20ea13a871c6964f5ba4 unpacked:74bb3b7cc661cb7712ee4f0ed2170e4fb80cd2c36e00c53128bf7ee382889a49
xiu tweet media
English
1
10
49
4.2K
Patrick Wardle retweetledi
Moonlock Lab
Moonlock Lab@moonlock_lab·
1/ℹ️We found a fully-featured macOS #RAT that zero AV vendors detected at the time of discovery. Meet "3Crypt RAT/C2 Capability Tester" - a #macOS binary with deep recon, persistence, evasion, and lateral movement capabilities. No real C2 infra. But don't let that fool you. 👇
Moonlock Lab tweet media
English
3
18
69
6K
Patrick Wardle retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🛑 26 fake wallet apps on Apple’s App Store stole recovery phrases and private keys. They mimicked MetaMask and Coinbase, worked via China-region accounts, and used phishing, OCR, or injected code to capture seed phrases. 🔗 Read → thehackernews.com/2026/04/26-fak…
English
11
59
109
14.2K
Patrick Wardle retweetledi
motuariki
motuariki@motuariki_·
I did some digging on these IOCs from @patrickwardle and found a number of fake Claude and mac troubleshoot pages directing users to run curl commands to a C2 of arkypc[.]com. Some are still live. Full list of landing pages and payload here: github.com/motuariki/IOCs…
Patrick Wardle@patrickwardle

@objective_see user pinged me about an active ClickFix attack: https://claudcode[.]playcode[.]io/ 1️⃣ Sponsored search result 2️⃣ Mirrors Claude Design page w/ ClickFix 3️⃣ Leads to (AMOS) stealer download/persistence Luckily BlockBlock's ClickFix detections will warn you 🛡️😍

English
1
6
25
4.9K
Patrick Wardle
Patrick Wardle@patrickwardle·
@objective_see user pinged me about an active ClickFix attack: https://claudcode[.]playcode[.]io/ 1️⃣ Sponsored search result 2️⃣ Mirrors Claude Design page w/ ClickFix 3️⃣ Leads to (AMOS) stealer download/persistence Luckily BlockBlock's ClickFix detections will warn you 🛡️😍
Patrick Wardle tweet mediaPatrick Wardle tweet mediaPatrick Wardle tweet media
English
1
9
43
9.4K
Patrick Wardle
Patrick Wardle@patrickwardle·
Testing <redacted> in a VM and fed its output into “AI” …which first informed me my VM is not a “valid target,” then helpfully suggested how to fix that 😵‍💫😂
Patrick Wardle tweet media
English
1
1
42
5.1K
Patrick Wardle retweetledi
Calum Hall
Calum Hall@_calumhall·
Hats off to Apple for bringing in some controls for ClickFix. But I'm pretty stoked with how Phorion builds on top of this at an enterprise level with our clipboard protection 🍎
Phorion@PhorionTech

Apple has now acknowledged ClickFix as a serious threat. The new protections in 26.4 meaningfully raise the bar for the average user. 🙌 However, for enterprises and developers, we thought more can still be done. So we built Phorion's advanced Clipboard Protection. 🧵

English
1
3
18
4.2K
Patrick Wardle retweetledi
Gen Threat Labs
Gen Threat Labs@GenThreatLabs·
If a macOS “repair” script needs to download coreaudiod from apple[.]driver-store[.]com, that’s not support. That’s malware delivery. This one fingerprints architecture, fetches the matching Mach-O, and runs a PyInstaller-packed payload with launchctl. #macOS #Malware Lures used in this campaign: - coreaudiod - ChromeUpdater - Microsoft/Teams - Google Payload collects: - browser data, including cookies - Slack and Telegram collection - Discord artifacts - Keychain-adjacent data access Clean lure. Dirty payload. Samples: 65cba741fe30fa4799fb9002ea8de6d96042a59159dd7c3419c766af24c835e6 e8ee6f5145c9d503c5130bfc6585567f6e19d409158c3c0ca0b259f1875b15f4 d4e863f9818bfb2f1dd932df6441dff204e6142c3bdb55b298cb08dc7b6a0c62 9c2ce925133a3bf5a924063bbef8df49918d5b7258695c1894cd18c75970157a
Gen Threat Labs tweet media
English
1
12
36
4.5K