Security News > 2020 > December > Patrick Wardle on Hackers Leveraging ‘Powerful’ iOS Bugs in High-Level Attacks
A recently uncovered zer0-click Apple zero-day flaw, used in a spyware campaign against Al Jazeera journalists, shed light this week on the impact of Apple security issues being abused by bad actors.
In 2020, the security research community saw an array of "Powerful" Apple bugs afflicting iOS, iPhone and more - and at the same time, cybercriminals stepped up their game, with new attacks leveraging legitimate Apple functionalities, said Patrick Wardle, principal security researcher with Jamf.
Wardle said the top Apple threat trends of 2020 included an influx of adware targeting Apple victims and the continual proliferation of the Lazarus APT group in the MacOS space.
Apple has also faced a slew of other security issues this year, such as a feature in the latest Big Sur release of macOS that allows some Apple apps to bypass content filters and VPNs. As more enterprises continue to embrace Macs and Apple products continue to gain popularity, Wardle said that cybercriminals will only continue to target MacOS victims in 2021: "Mac attacks - and Mac malware - isn't going away anytime soon," he stressed.
Download our exclusive FREE Threatpost Insider eBook Healthcare Security Woes Balloon in a Covid-Era World , sponsored by ZeroNorth, to learn more about what these security risks mean for hospitals at the day-to-day level and how healthcare security teams can implement best practices to protect providers and patients.
News URL
Related news
- Hackers breach US firm over Wi-Fi from Russia in 'Nearest Neighbor Attack' (source)
- North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks (source)
- Russian hackers hijack Pakistani hackers' servers for their own attacks (source)
- Russian hackers hijack Pakistani hackers' servers for their own attacks (source)
- 390,000 WordPress accounts stolen from hackers in supply chain attack (source)
- Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks (source)
- Russian hackers use RDP proxies to steal data in MiTM attacks (source)
- Chinese hackers targeted sanctions office in Treasury attack (source)