TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Handbrake malware analysis

165 pointsby zalmoxesabout 8 years ago

7 comments

untangleabout 8 years ago
For those Mac users who are unfamiliar with objective-see... Their free security tools for MacOS are a boon to the community. I think that they are right up there with "little snitch" and the like, especially since they spare the user the typical IDS data overload.
评论 #14285668 未加载
评论 #14284197 未加载
评论 #14286179 未加载
评论 #14284699 未加载
AsyncAwaitabout 8 years ago
I think hosting the Handbrake, (and Transmission) binaries on the GitHub releases page of the repo would be harder to compromise than their own servers.
评论 #14284712 未加载
评论 #14284773 未加载
coldcodeabout 8 years ago
If you look at the XProtect files, the syntax is pretty funny.<p><pre><code> condition: Macho and filesize &lt; 600000 and filesize &gt; 10000 and all of them</code></pre>
评论 #14286012 未加载
awinter-pyabout 8 years ago
Article talks about a fake authentication popup.<p>Has anyone used a platform that had an unspoofable one of these?
评论 #14287633 未加载
评论 #14289447 未加载
differentialsabout 8 years ago
If you used brew install handbreak between May 2nd and 5th, you downloaded the malicious version; - <a href="https:&#x2F;&#x2F;github.com&#x2F;caskroom&#x2F;homebrew-cask&#x2F;commit&#x2F;461af7672fa267ed42bd5572c20bf337cb4da87e" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;caskroom&#x2F;homebrew-cask&#x2F;commit&#x2F;461af7672fa...</a> The pull request has comments as well, and a snarky dev ;D - <a href="https:&#x2F;&#x2F;github.com&#x2F;caskroom&#x2F;homebrew-cask&#x2F;pull&#x2F;33354" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;caskroom&#x2F;homebrew-cask&#x2F;pull&#x2F;33354</a>
atmosxabout 8 years ago
The only actual counter-measure would be to take the extra step and calculate the SHASUM of the binary.<p>The shasum need to be digitally signed with a valid signature otherwise it can be manipulated as well.<p>ps. Ofc tools like littlesnitch and blockblock help, but keeping track of all the applications that try to access the internet is kinda hard these days, especially on a user machine.
评论 #14284573 未加载
评论 #14284478 未加载
merbabout 8 years ago
that&#x27;s the reason why i install most mac programs that come from a website into user programs. this only works for programs that don&#x27;t add stuff to the system of course.