Google abandoning Windows for Linux and MacOS

Earlier this week, a few stories appeared about Google dropping Windows inside their corporate network, in favor of MacOS and Linux. This seems to have been triggered by the famous targeted attack now known as the “Aurora” operation. Of course, this looks like a huge blow to the security image of Microsoft products, however, does it really make any sense?

First of all, Google didn’t get broken into because they were running Windows. They got hacked because they used IE6, a product that is 9 years old. Google fell victim to the attack because they didn’t follow the most basic security advice we recommend for our users, which is, patch and use a modern browser, like IE8 or Firefox.

Additionally, MacOS is no more secure than Windows 7; on the contrary, it might even be worse because of the false sense of security it provides.

The right thing to do here would have been to switch to Windows 7, on x64 and use Firefox or Chrome for web browsing. Then, creating a company policy where users can’t log in to the corporate network unless they have the most recent patches and their AVs up to date.

Given the recent news of MacOS malware in the wild, I wonder how long until the targeted attack story repeats on MacOS, or Linux. Because, without following the most basic security practices, you will become a victim in no time.

Google abandoning Windows for Linux and MacOS

Your email address will not be published. Required fields are marked *



Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Lazarus covets COVID-19-related intelligence

As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that the Lazarus group is going after intelligence that could help these efforts by attacking entities related to COVID-19 research.

Sunburst: connecting the dots in the DNS requests

We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for further exploitation. In total, we analyzed 1722 DNS records, leading to 1026 unique target name parts and 964 unique UIDs.

What did DeathStalker hide between two ferns?

While tracking DeathStalker’s Powersing-based activities in May 2020, we detected a previously unknown implant that leveraged DNS over HTTPS as a C2 channel, as well as parts of its delivery chain. We named this new malware “PowerPepper”.

Subscribe to our weekly e-mails

The hottest research right in your inbox