Security News > 2020 > December > Patrick Wardle on Hackers Leveraging ‘Powerful’ iOS Bugs in High-Level Attacks
A recently uncovered zer0-click Apple zero-day flaw, used in a spyware campaign against Al Jazeera journalists, shed light this week on the impact of Apple security issues being abused by bad actors.
In 2020, the security research community saw an array of "Powerful" Apple bugs afflicting iOS, iPhone and more - and at the same time, cybercriminals stepped up their game, with new attacks leveraging legitimate Apple functionalities, said Patrick Wardle, principal security researcher with Jamf.
Wardle said the top Apple threat trends of 2020 included an influx of adware targeting Apple victims and the continual proliferation of the Lazarus APT group in the MacOS space.
Apple has also faced a slew of other security issues this year, such as a feature in the latest Big Sur release of macOS that allows some Apple apps to bypass content filters and VPNs. As more enterprises continue to embrace Macs and Apple products continue to gain popularity, Wardle said that cybercriminals will only continue to target MacOS victims in 2021: "Mac attacks - and Mac malware - isn't going away anytime soon," he stressed.
Download our exclusive FREE Threatpost Insider eBook Healthcare Security Woes Balloon in a Covid-Era World , sponsored by ZeroNorth, to learn more about what these security risks mean for hospitals at the day-to-day level and how healthcare security teams can implement best practices to protect providers and patients.
News URL
Related news
- Hackers deploy AI-written malware in targeted attacks (source)
- N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks (source)
- North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks (source)
- Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (source)
- Notorious Hacker Group TeamTNT Launches New Cloud Attacks for Crypto Mining (source)
- North Korean govt hackers linked to Play ransomware attack (source)
- Hackers increasingly use Winos4.0 post-exploitation kit in attacks (source)