{"id":12972,"date":"2018-08-01T06:30:04","date_gmt":"2018-08-01T14:30:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/08\/01\/news-6739\/"},"modified":"2018-08-01T06:30:04","modified_gmt":"2018-08-01T14:30:04","slug":"news-6739","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/01\/news-6739\/","title":{"rendered":"Apple users \u2018most appealing\u2019 to cybercriminals&#039; online scams"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2017\/02\/dark_web_hacker_tablet_malware-100708186-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 01 Aug 2018 06:17:00 -0700<\/strong><\/p>\n<p>Apple\u2019s platforms may be the most secure, but this is driving cybercriminals to more devious ways to undermine iOS and Mac security \u2014 partly because hacked Apple user credentials are among the most valuable properties you\u2019ll find on the so-called dark web.<\/p>\n<p>There is no doubt at all that <a href=\"https:\/\/blogs.computerworld.com\/article\/3269356\/apple-has-become-an-hr-issue-for-enterprise-it.html\" rel=\"nofollow\">Apple is growing in the enterprise<\/a>, which is why every iOS or macOS user needs to understand that the new cyber threats aren\u2019t confined to annoying viruses, trojans, or malware attacks.<\/p>\n<p>Enterprise security chiefs are becoming increasingly aware that network, device, location-based, and user security must also be seen as part of the mix. <a href=\"https:\/\/blogs.computerworld.com\/article\/3290415\/apple-mac\/the-macbook-pro-s-t2-chip-boosts-enterprise-security.html?nsdr=true\" rel=\"nofollow\">Platform security<\/a> is only one element to an overall security picture.<\/p>\n<p>Phishing, spoofing, and complex multi-vector attempts are becoming increasingly common, and the dark web is a great reflection of what activity is taking place. More conventional attacks are also increasing. A recent Malwarebytes survey claimed <a href=\"https:\/\/blogs.computerworld.com\/article\/3262225\/apple-mac\/warning-as-mac-malware-exploits-climb-270.html\" rel=\"nofollow\">malware attacks on Macs climbed 270 percent<\/a> last year.<\/p>\n<p>In response to highly sophisticated new threats, there is a growing understanding of the need for pooled information and sophisticated situational awareness tools.<\/p>\n<p>Top10VPN\u2019s latest <a href=\"https:\/\/www.top10vpn.com\/privacy-central\/cybersecurity\/dark-web-market-price-index-hacking-tools-us-edition\/\" rel=\"nofollow\">Dark Web Market Price Index<\/a> suggests Apple users are becoming the most popular targets for online scammers. In March, the index reported that Apple ID data trades hands at <a href=\"https:\/\/blogs.computerworld.com\/article\/3261128\/apple-ios\/criminals-pay-just-15-for-apple-icloud-account-ids-report-claims.html?nsdr=true\" rel=\"nofollow\">$15 per account<\/a>.<\/p>\n<p>\u201cIt\u2019s clear from our research that Apple users are the most appealing targets for online scammers,\u201d Simon Migliano, head of research at Top10VPN, told me.<\/p>\n<p>\u201cReady-made phishing pages for Apple IDs, along with config files for password crackers, go for more than double the near-uniform rate of $2.07 for the vast majority of other brands,\u201d he explained.<\/p>\n<p>Supply and demand suggests this means that where an exploit has been created and is sold, the market is interested enough to spend more on the tool \u2014 though this doesn\u2019t mean the tools are any good.<\/p>\n<p>Good or bad, you can purchase a wide variety of hacking tools on the dark web \u2014 from software such as remote access trojans and card cloning software to hardware kits to spoof cell towers and intercept texts and calls from connecting devices. Security researchers watch what is being sold to get a sense of what form future attacks may take.<\/p>\n<p>The interest in Apple attacks reflects several key trends: Apple customers are also active users of the products they own, the<a href=\"https:\/\/blogs.computerworld.com\/article\/3272405\/apple-pay-hey-siri-get-me-a-goldman-sachs-mortgage.html\" rel=\"nofollow\">\u00a0relative wealth<\/a> of the demographic, and the kind of information they have access to, particularly in the enterprise.<\/p>\n<p>That doesn\u2019t mean such attacks will succeed, or that users should panic, but the information should certainly help inform security preparedness across both consumer and enterprise markets.<\/p>\n<p>One thing the report does suggest is that rather than platform-based attacks, cybercriminals are moving to trust-based attacks to target the valuable Apple demographic. They work to persuade users to click on innocuous-seeming pages, persuade them to enter banking details on spoof banking pages, and so on. Apple is wise to this, and to help protect customers, it recently introduced <a href=\"http:\/\/www.applemust.com\/how-to-use-apples-new-privacy-feature-for-ios-and-mac\/\" rel=\"nofollow\">new phishing protection tools<\/a> for Macs and iOS devices.<\/p>\n<p>While I don\u2019t accept the argument that by merely becoming a bigger target for attacks, Apple security will ultimately fail, I also reject arguments that state that merely because Apple has been really secure so far there is nothing to be concerned about. Complacency is no defense.<\/p>\n<p>Apple users must ensure they remain security aware. A link in an email that seems to come from someone you know may take you to a spoofed website designed to collect your login data. That login data may itself unlock additional information a criminal may use in a follow-up attempt to undermine someone else\u2019s security \u2014 or to break into your company\u2019s valuable enterprise systems.<\/p>\n<p>There is a trend in which attackers design extremely complex multi-vector attacks in which individual exploits are personalized for each person at a company or other target entity in order to establish enough overall data through a sequence of attacks with which to penetrate enterprise systems.<\/p>\n<p>Despite Apple\u2019s growing status as a target, there\u2019s little need to panic.<\/p>\n<p>Not only does the company regularly issue easy-to-install security patches for all its non-fragmented platforms, but instances of successful exploits are historically low compared with competing solutions.<\/p>\n<p>However, these new-breed attacks aim to sidestep Apple\u2019s security by aiming at the weakest link in the security ecosystem \u2014 the end user.<\/p>\n<p>\u201cI would urge any business using Apple products should urgently review their policies regarding use of Apple devices, particularly mobile, in the workplace, with particular focus on login security, proper separation of corporate and personal data and ensuring staff are trained to recognize phishing attempts,\u201d said Migliano.<\/p>\n<p>\u201cIn fact, every Apple user should be aware that they are being targeted over and above users of other platforms and protect themselves accordingly.\u201d<\/p>\n<p>There are numerous good practice habits every computer user should follow:<\/p>\n<p><strong>Google+?<\/strong>\u00a0If you use social media and happen to be a Google+ user, why not\u00a0join\u00a0<a href=\"https:\/\/plus.google.com\/u\/0\/communities\/102592251674546201152\" rel=\"nofollow\">AppleHolic&#8217;s Kool Aid Corner community<\/a>\u00a0and get involved with the conversation as we pursue the spirit of the New Model Apple?<\/p>\n<p><strong>Got a story? Please\u00a0<\/strong><a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow\">drop me a line via Twitter<\/a>\u00a0and let me know. I&#8217;d like it if you chose to follow me there so I can let you know about new articles I publish and reports I find.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3293922\/security\/apple-users-most-appealing-to-cybercriminals-online-scams.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.techhive.com\/images\/article\/2017\/02\/dark_web_hacker_tablet_malware-100708186-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 01 Aug 2018 06:17:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Apple\u2019s platforms may be the most secure, but this is driving cybercriminals to more devious ways to undermine iOS and Mac security \u2014 partly because hacked Apple user credentials are among the most valuable properties you\u2019ll find on the so-called dark web.<\/p>\n<h2><strong>A complex crime<\/strong><\/h2>\n<p>There is no doubt at all that <a href=\"https:\/\/blogs.computerworld.com\/article\/3269356\/apple-has-become-an-hr-issue-for-enterprise-it.html\" rel=\"nofollow\">Apple is growing in the enterprise<\/a>, which is why every iOS or macOS user needs to understand that the new cyber threats aren\u2019t confined to annoying viruses, trojans, or malware attacks.<\/p>\n<p>Enterprise security chiefs are becoming increasingly aware that network, device, location-based, and user security must also be seen as part of the mix. <a href=\"https:\/\/blogs.computerworld.com\/article\/3290415\/apple-mac\/the-macbook-pro-s-t2-chip-boosts-enterprise-security.html?nsdr=true\" rel=\"nofollow\">Platform security<\/a> is only one element to an overall security picture.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3293922\/security\/apple-users-most-appealing-to-cybercriminals-online-scams.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10480,10554,714],"class_list":["post-12972","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-ios","tag-mobile","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12972","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12972"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12972\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12972"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12972"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12972"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}