Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:12)
Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effort, transform complexity into simplicity and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire.
B (1:35)
Hello everyone and welcome to the Cyberwires Research Saturday. I'm Dave Bittner and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems and protecting ourselves in our rapidly evolving cyberspace. Thanks for joining us.
C (1:59)
So we have some different live hunt rule set up and this one actually stumbled about because of a way in which it was performing shell outs to collect process information. And we sort of said hey, like there's a lot going on with this executable than just collecting processes, right? It's doing some really interesting stuff.
B (2:20)
That's Jaron Bradley, director of JAMF Threat Labs. The research we're discussing today is titled Chilly Hell A Deep Dive into a modular macOS backdoo.
C (2:37)
So that's kind of what initially caught our attention and then the more we looked at it and, and kind of observed observed it, we saw it aligned with, with a report that had been, that had been previously done by Mandian is a private report that they shared at one point that they gave us permission to kind of, you know, share a little bit of additional detail on when we release the blog post.
B (3:08)
Well, I mean let's dig into the details here together.
D (3:11)
What is Chilly Hell?
B (3:13)
What is it setting out to do here?
![When macOS gets frostbite. [Research Saturday] - CyberWire Daily cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Fa643e1b8-d1f8-11f0-8ec8-431f1da4b1ab%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)