🚨 Apple devices are being used more and more in both business and personal settings, which makes them prime targets for cybercriminals. Threat actors have started adapting effective Android threats to Apple devices. As a symptom of this trend, Group-IB recently uncovered GoldPickaxe, the first face-stealing iOS Trojan that has evolved from the infamous Android malware GoldDigger.
Against this background, it is crucial to investigate Apple threats and raise awareness among users. While some iOS vulnerabilities (e.g., Checkm8) cannot be fixed with software updates and pose risks to users, cybersecurity experts can leverage them to analyze and counteract the malware.
🎓 Sergey Nikitin, Group-IB’s Chief Regional Officer and digital forensics expert, shares advice to help businesses and users detect and investigate malicious apps and other iOS threats.
🔗 Read and apply his insights today
#GoldPickaxe #Malware #iOS #Cybersecurity #Apps #iPhone #FightAgainstCybercrime #CyberThreats
Against this background, it is crucial to investigate Apple threats and raise awareness among users. While some iOS vulnerabilities (e.g., Checkm8) cannot be fixed with software updates and pose risks to users, cybersecurity experts can leverage them to analyze and counteract the malware.
🎓 Sergey Nikitin, Group-IB’s Chief Regional Officer and digital forensics expert, shares advice to help businesses and users detect and investigate malicious apps and other iOS threats.
🔗 Read and apply his insights today
#GoldPickaxe #Malware #iOS #Cybersecurity #Apps #iPhone #FightAgainstCybercrime #CyberThreats
👍12🔥1