AdvancedMalwaremacOSReverse Engineering

The Art of Mac Malware, Volume 1

The Guide to Analyzing Malicious Software

4 / 5

Patrick Wardle's deep dive on macOS malware analysis: persistence patterns, injection techniques, anti-analysis tricks, and the macOS-specific tooling needed to triage real samples.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2022
Publisher
No Starch Press
Pages
328
Language
English

Read this if

Malware analysts who need to handle macOS samples and have so far worked Windows-only. The only serious book in print on Mac malware, by the most prominent practitioner in the field.

Skip this if

Analysts who don't see macOS in their pipeline. The platform specifics (Mach-O, code signing, TCC, XPC, launch agents) are non-transferable to other operating systems.

Key takeaways

  • Mach-O analysis differs from PE analysis in non-trivial ways; the chapters on entitlements, code signing, and notarization are the practical foundation.
  • macOS persistence has its own taxonomy (LaunchAgents, LaunchDaemons, login items, period plists, dylib hijacks); learning it is half the analyst's job.
  • Apple's own tooling (Console.app, sample, fs_usage, Endpoint Security framework) is the right starting toolkit for triage; Wardle's framing is the cleanest in print.

Notes

Pair with Wardle's Objective-See tools (BlockBlock, KnockKnock, Lulu) and with the Volume 2 book on detection. Required reading for any blue team that handles Mac endpoints in 2026 (most of them now). The book pre-dates a few Sequoia-era changes; check the Objective-See blog for current refinements.