Keeping Safe From The New Vulnerability 'Cavallarin' Found In MacOS
Cooky - Jul 12, 2019
A new vulnerability called Cavallarin has been found in macOS's Gatekeeper.
- North Korea Targets And Hacks Security Researchers' Computers, Google Finds
- After 6 Months Of Waiting, Big Sur Is Finally Here, Available Starting November 12
- First Apple Silicon Mac Devices Leaked In macOS's Codes
For a long time, macOS's Gatekeeper has been tasked with checking whether the installed applications match apps that Apple has certified. As for the work, in case of installing an application without receiving an "all clear" message from Apple, Gatekeeper will cancel this application. If users still want to install the app, they must re-confirm their installation. However, the feature has been disclosed with the “Cavallarin” exploit.

The "Cavallarin Exploit"
Filippo Cavallarin, a security researcher, (the exploit is named after him) has found out this serious vulnerability in Gatekeeper that makes it possible for non-trusted apps to take advantage of this weakness to steal the free pass. The reason is the installation whitelisting ò Gatekeeper from network shares and external drives and here is the way to penetrate the flaw.

A few weeks ago Cavallarin discovered the issue and reported that Apple had 90 days for fixing it. However, no response was received from the Apple, so on April 5, Cavallari announced the exploit. Even when the notification has been published, the error is still not corrected by Apple. Currently, Intego's malware research team has begun to receive signs of Gatekeeper displayed on the internet.
Four samples of malware uploaded to Virustotal as of July 6 were followed by Intego. As a result, all disk images show the same malicious application that is connected to a single server. This issue was soon identified as an initial test of a malware named "OSX / Linker". Team Intego suspects that this test is done by the same developers that created the OSX/Surfbuyer malware.
When "testing" has not become serious at this time, Joshua Long - security analyst at Intego, has explained this vulnerability's nature leaves the way for the worst situations.
Prevention Methods
At the moment, it's hard to know when Apple can completely fix this, so users need to carry along some methods to self-prevention. The simplest is to follow Apple-certified apps from the App Store and to question about applications that you download without any authenticity of the source.
Users can check their system if there is an exploit related to threats via free VirusBarries - allowing threats to be displayed in the form of OSX / Linker, due to the Os/Link threat is added into Intego registries by Intego’s premium antivirus programs VirusBarrier X9 and Flexivity. Intego also announced that infected users can submit their online form.

On Intego's blog, in Cavallarin exploit part also suggests a few other precautions but quite risky because they require MacOS security measures to be disabled and edited. For simplicity, we recommend users to create a habit of being alert when online and doubting the application installed and scanning the virus before continuing.
Featured Stories
Features - Jul 01, 2025
What Are The Fastest Passenger Vehicles Ever Created?
Features - Jun 25, 2025
Japan Hydrogen Breakthrough: Scientists Crack the Clean Energy Code with...
ICT News - Jun 25, 2025
AI Intimidation Tactics: CEOs Turn Flawed Technology Into Employee Fear Machine
Review - Jun 25, 2025
Windows 11 Problems: Is Microsoft's "Best" OS Actually Getting Worse?
Features - Jun 22, 2025
Telegram Founder Pavel Durov Plans to Split $14 Billion Fortune Among 106 Children
ICT News - Jun 22, 2025
Neuralink Telepathy Chip Enables Quadriplegic Rob Greiner to Control Games with...
Features - Jun 21, 2025
This Over $100 Bottle Has Nothing But Fresh Air Inside
Features - Jun 18, 2025
Best Mobile VPN Apps for Gaming 2025: Complete Guide
Features - Jun 18, 2025
A Math Formula Tells Us How Long Everything Will Live
Features - Jun 16, 2025
Comments
Sort by Newest | Popular