Security News > 2020 > December > Patrick Wardle on Hackers Leveraging ‘Powerful’ iOS Bugs in High-Level Attacks

A recently uncovered zer0-click Apple zero-day flaw, used in a spyware campaign against Al Jazeera journalists, shed light this week on the impact of Apple security issues being abused by bad actors.
In 2020, the security research community saw an array of "Powerful" Apple bugs afflicting iOS, iPhone and more - and at the same time, cybercriminals stepped up their game, with new attacks leveraging legitimate Apple functionalities, said Patrick Wardle, principal security researcher with Jamf.
Wardle said the top Apple threat trends of 2020 included an influx of adware targeting Apple victims and the continual proliferation of the Lazarus APT group in the MacOS space.
Apple has also faced a slew of other security issues this year, such as a feature in the latest Big Sur release of macOS that allows some Apple apps to bypass content filters and VPNs. As more enterprises continue to embrace Macs and Apple products continue to gain popularity, Wardle said that cybercriminals will only continue to target MacOS victims in 2021: "Mac attacks - and Mac malware - isn't going away anytime soon," he stressed.
Download our exclusive FREE Threatpost Insider eBook Healthcare Security Woes Balloon in a Covid-Era World , sponsored by ZeroNorth, to learn more about what these security risks mean for hospitals at the day-to-day level and how healthcare security teams can implement best practices to protect providers and patients.
News URL
Related news
- Chinese hackers targeted sanctions office in Treasury attack (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- Google says hackers abuse Gemini AI to empower their attacks (source)
- Hacker pleads guilty to SIM swap attack on US SEC X account (source)
- whoAMI attacks give hackers code execution on Amazon EC2 instances (source)
- Microsoft: Hackers steal emails in device code phishing attacks (source)
- Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks (source)