Apple Users Hit with Rare Cyberattack: What Can We Learn?

Apple Users Hit with Rare Cyberattack: What Can We Learn?

On Wednesday, April 10, 2024, Apple deemed it necessary to send a rare alert to certain users via email, spread out across 92 nations. As Apple’s website states, these threat notifications “are designed to inform and assist users who may have been individually targeted by mercenary spyware attacks.” Let’s review these attacks so we all understand this threat better.

What are Mercenary Attacks?

When we think of more “typical” cyberattacks, they are commonly designed to target as many people as possible, often using rudimentary attack methods to identify the easiest targets to pursue. A mercenary attack is similar to this but on a much smaller scale, with millions of dollars spent to target a relatively small target pool.

As the threat notification email informed potential targets, “This attack is likely targeting you specifically because of who you are or what you do.”

The email also describes the kinds of things that this attack, as a mercenary spyware attack specifically, would likely do, stating, 

“If your device is compromised by a targeted mercenary spyware attack, the attacker may be able to remotely access your sensitive data, communications, or even the camera and microphone.”

What Has Apple Done to Address the Threat?

Apple has added a support page describing these attacks, and what an impacted Apple user should do if they suspect their device is infected. This includes a list of best practices that we can very much sign off on:

  • “Update devices to the latest software, as that includes the latest security fixes
  • Protect devices with a passcode
  • Use two-factor authentication and a strong password for Apple ID [we just want to add you should do this with all accounts]
  • Install apps from the App Store [all Android users should only utilize the Google Play store]
  • Use strong and unique passwords online
  • Don’t click on links or attachments from unknown senders”

Apple also recommended that those who had not yet been targeted, but had reason to suspect they might be, to turn on “Lockdown Mode,” which restricts the device to very limited functions to reduce the attack surface that these kinds of targeted threats would use.

Hopefully, you won’t be targeted by these kinds of attacks, but we wanted to help spread the word as much as possible, and we’re not going to miss the opportunity to share some security best practices. For more security best practices and general technology assistance for your business needs, please consider the managed services that we offer here at White Mountain IT Services. Call us at (603) 889-0800 to discuss your options with our team of experts.

Related Posts

Tip of the Month: Using Email While Prioritizing Safety and Security

You probably use your email every day without even thinking about it. Email is, however, one of the main places hackers go when they want to steal personal information. Here are three easy steps you can take to keep your email secure. Use Strong, Unique Passwords A strong password is like a firm lock on your front door: it should be tough to crack. Here’s how to make one: Mix it up -Use a c...

Update Your Computers’ OS to Keep Your Business Humming Along

An operating system is the main program on any device, like a computer, phone, or tablet, that helps it work. It's what lets you open apps, go online, and get stuff done! For businesses, keeping their OS updated is super important. Here’s why: Security Comes First Hackers are always finding new ways to sneak into computers and steal data. If a business has important information, like customer ...

If Your Business’ Technology Isn’t Working, Your Business Isn’t Either

Most businesses rely on their technology. However, a failure to manage that technology can lead to significant financial waste and operational inefficiencies. One major way a business can waste money is through over-investment in unnecessary or overly complex IT infrastructure. Let’s briefly examine how companies waste their money on technology and how to identify if technology is working for your...

Smart Devices are Undermining Your Privacy

In a time when Internet connectivity is so important, manufacturers have met this demand by creating products that feature the ability to connect to apps or other Internet-based dashboards. Unfortunately for users, there is a lot that can go wrong when organizational practices don’t do enough to protect their customer’s privacy; or, simply look to exploit it. Let’s take a look at how the smart dev...