<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Xprotect on cpus.me</title>
    <link>https://cpus.me/tags/xprotect/</link>
    <description>Recent content in Xprotect on cpus.me</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 16 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://cpus.me/tags/xprotect/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>XProtect and XProtect BehaviorService: previous research</title>
      <link>https://cpus.me/2026/xprotect-behavior-service/</link>
      <pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://cpus.me/2026/xprotect-behavior-service/</guid>
      <description>&lt;p&gt;Recently started looking into macOS&amp;rsquo; &lt;code&gt;XProtect&lt;/code&gt; and its satellites. There are a few interesting presentations and articles from previous research done in the last years.&#xA;I mainly want to capture some of the ones that I already went through and found valuable before I publish some of my own findings, learnings and failures.&lt;/p&gt;&#xA;&lt;p&gt;The following two presentations are particularly interesting on what &lt;code&gt;XProtect&lt;/code&gt; is and &lt;code&gt;XProtect Remediator&lt;/code&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://youtu.be/43BIK-e7FBE?si=YWk-pVn_1CZk0kJ2&#34;&gt;MDOYVR23 - Stuart Ashenbrenner - (dm)XProtect: Stop, Drop, Shut malware down before it opens up shop&#xA;&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://youtu.be/1pJWqtBxb50?si=S6DyzwyJxFvT8SEB&#34;&gt;Black Hat USA 2025 | XUnprotect: Reverse Engineering macOS XProtect Remediator&#xA;&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;I heard about &lt;code&gt;XProtect&lt;/code&gt; before, maybe around end of 2024 or so, but never had the interest to research it. But with some of the latest updates related to clipboard pasting and &lt;code&gt;ClickFix&lt;/code&gt; campaigns, my interest grew so I started looking into how this works. My own research, so far, for this &lt;code&gt;XProtect&lt;/code&gt; feature hasn&amp;rsquo;t uncovered anything new than what is detailed in this high quality research done by &lt;a href=&#34;https://objective-see.org/blog/blog_0x87.html&#34;&gt;Patrick Wardle&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
