- Calif researchers used Anthropic’s Mythos Preview to chain two bugs and strategies into a macOS kernel exploit on Apple M5
- The exploit bypassed Apple’s new Reminiscence Integrity Enforcement, reaching root shell in five days regardless of years of Apple funding
- Assault highlights Mythos’ energy in surfacing unknown flaws; Apple is reportedly working on a repair
Cybersecurity researchers Calif have defined how they used Anthropic’s (now) famed Mythos Preview AI instrument to create a working macOS kernel reminiscence corruption exploit on Apple’s latest M5 silicon, warning their work was a “glimpse of what’s coming” for {hardware} and software program that was constructed “in a world earlier than Mythos Preview.”
In September 2025, Apple launched a new safety characteristic designed to dam hacking strategies that exploit software program reminiscence flaws.
Referred to as Reminiscence Integrity Enforcement (MIE), the characteristic makes use of hardware-level reminiscence checks to cease malicious code from accessing knowledge it shouldn’t. It was launched alongside the iPhone 17 lineup and the brand new A19 chips.
Execution mannequin persists
In April 2026, Anthropic allowed a handful of know-how firms, together with Calif, to entry Mythos Preview, so they may get a head begin on everybody else and safe their environments.
The corporate claimed Mythos was able to surfacing unknown vulnerabilities and creating working exploits and as such was too harmful to just be launched to most people.
Calif used Mythos to hyperlink “two bugs and a handful of strategies to deprave the Mac’s reminiscence after which achieve entry to components of the gadget that must be inaccessible.” Commenting on their findings, the Calif group stated Apple spent five years and “in all probability billions” of {dollars} to build MIE, whereas they managed to interrupt it in five days.
“The exploit is a data-only kernel native privilege escalation chain focusing on macOS 26.4.1 (25E253),” Calif stated in a Substack submit. “It begins from an unprivileged native consumer, makes use of solely regular system calls, and ends with a root shell. The implementation path includes two vulnerabilities and a number of other strategies, focusing on bare-metal M5 {hardware} with kernel MIE enabled.”
Apparently, Apple is presently working on a repair. Most likely utilizing Mythos, too.

One of the best antivirus for all budgets
Comply with TechRadar on Google Information and add us as a most popular supply to get our professional information, opinions, and opinion in your feeds.
Source link
#Anthropic #Mythos #helped #build #working #macOS #exploit #days


