Blog

Dresner Group Blog

Our technology blogs feature IT tips and best practices for businesses in Columbia, Baltimore, Bel Air and in and about Maryland since 2002.

Apple Users Hit with Rare Cyberattack: What Can We Learn?

Apple Users Hit with Rare Cyberattack: What Can We Learn?

On Wednesday, April 10, 2024, Apple deemed it necessary to send a rare alert to certain users via email, spread out across 92 nations. As Apple’s website states, these threat notifications “are designed to inform and assist users who may have been individually targeted by mercenary spyware attacks.” Let’s review these attacks so we all understand this threat better.

What are Mercenary Attacks?

When we think of more “typical” cyberattacks, they are commonly designed to target as many people as possible, often using rudimentary attack methods to identify the easiest targets to pursue. A mercenary attack is similar to this but on a much smaller scale, with millions of dollars spent to target a relatively small target pool.

As the threat notification email informed potential targets, “This attack is likely targeting you specifically because of who you are or what you do.”

The email also describes the kinds of things that this attack, as a mercenary spyware attack specifically, would likely do, stating, 

"If your device is compromised by a targeted mercenary spyware attack, the attacker may be able to remotely access your sensitive data, communications, or even the camera and microphone."

What Has Apple Done to Address the Threat?

Apple has added a support page describing these attacks, and what an impacted Apple user should do if they suspect their device is infected. This includes a list of best practices that we can very much sign off on:

  • “Update devices to the latest software, as that includes the latest security fixes
  • Protect devices with a passcode
  • Use two-factor authentication and a strong password for Apple ID [we just want to add you should do this with all accounts]
  • Install apps from the App Store [all Android users should only utilize the Google Play store]
  • Use strong and unique passwords online
  • Don’t click on links or attachments from unknown senders”

Apple also recommended that those who had not yet been targeted, but had reason to suspect they might be, to turn on “Lockdown Mode,” which restricts the device to very limited functions to reduce the attack surface that these kinds of targeted threats would use.

Hopefully, you won't be targeted by these kinds of attacks, but we wanted to help spread the word as much as possible, and we’re not going to miss the opportunity to share some security best practices. For more security best practices and general technology assistance for your business needs, please consider the managed services that we offer here at Dresner Group. Call us at (410) 531-6727 to discuss your options with our team of experts.

×
Stay Informed

When you subscribe to the blog, we will send you an e-mail when there are new updates on the site so you wouldn't miss them.

Help! An Ex-Employee Deleted All of Their Data Bef...
Downloading and Installing APK Files Could Put You...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, 29 April 2024

Captcha Image

Client Service Login

Latest News & Events

Columbia, MD - Dresner Group is proud to announce its sponsorship of the upcoming ABC Joint Tech Summit, a premier event hosted by the four local chapters of the Associated Builders and Contractors (ABC). The summit, spanning two days, will be held o...

Contact Us

Learn more about what Dresner Group can do for your business.

Copyright Dresner Group. All Rights Reserved.