Hackers Likely To Target More Apple Devices in 2016

The Apple ecosystem has managed to avoid suffering from many of the worst cybercrimes and exploits over the years. But that could soon change, according to a new report by technology security firm FireEye.

In its ?EU?Looking Forward: the 2016 Security Landscape,?EU? report, FireEye outlined a future in which Apple products will become a greater focus for cybercriminals. ?EU?Apple?EU?s traditionally secure software and devices have experienced some interesting threats in recent years, some of which have remained persistent and have evolved over time,?EU? according to the report.

That includes the 2014 Masque attack, a threat discovered by FireEye researchers that could allow an authentic app to be replaced with a malicious app. This year, three additional Masque attacks have been discovered, which could enable an attacker to demolish an app, break the app's data container and hijack virtual private network traffic.

Apple?EU?s Success Makes It a Target

The expected increase in attacks against Apple will likely be driven as a result of the company's significant market share in the desktop and mobile device spaces. The company?EU?s success in these markets has made developing attacks targeting its ecosystem increasingly lucrative for criminals.

Another development involves XcodeGhost, a previously identified iOS malware that managed to make its way past Apple?EU?s security checks and into the Apple App Store. Recently, FireEye?EU?s researchers discovered that the threat had breached U.S. enterprises; its botnet was still partially active; and a more advanced variant called XcodeGhost S had been previously undetected.

Apple is hardly the only target likely to experience greater and more numerous threats next year. Industrial control systems (ICS) that are responsible for managing crucial elements of infrastructure are also likely to come under attack more frequently. The reasons: the increasing connectivity of operational technology systems; increased remote monitoring and diagnostics; legacy infrastructure; and more prevalent ICS...

Comments are closed.