
Apple has sent a special notification to users across the globe warning them of a ‘mercenary spyware’ attack. The notification has been shared with Apple device users in 92 countries including in India who may have been targeted by a ‘mercenary spyware’ attack because of ‘who they are or what they do’.
A spyware is piece of software that is designed to enter your device covertly, gather data about you, and share confidential information about you to the attack. It captures everything from your login credentials, financial details, email-related details and even your keyboard strokes.
A mercenary spyware is highly specialised form of spyware that is targeted at specific users by attackers who stand to gain a lot by spying on a specific user owing to what they do or who they are. As Apple explains it, such attacks are vastly more complex than regular cybercriminal activity as the attackers apply exceptional resources to target a very small number of specific individuals and their devices. Mercenary spyware attacks cost millions of dollars and often have a short shelf life, making them much harder to detect and prevent. One example of such an attack is using Pegasus by the NSO Group.
Simply put, majority of the Apple device users don’t have to worry such specialised attacks.
In this case, Apple has a notification to iPhone users in India alerting them of an ‘attack that is trying to remotely compromise the iPhone associated with your Apple ID‘. This threat notification is displayed at the top of page when a user logs into their Apple ID on the web. Apple also notifies users using emails and an iMessage notification.
Apple recommends that all users who have received such a notification should get in touch with its rapid-response emergency security team that provides assistance by a Digital Security Helpline 24 x 7. Apple device users can get in touch with the team by visiting the Digital Security Helpline’s official website. Alternatively, they can also get in touch with the team by clicking here.
Apple has also issued a set of general guidelines for its users, which they can use to protect themselves from all cyber threat. Here’s the list:
— Update your Apple devices to the latest software.
— Protect devices with a passcode.
— Use two-factor authentication and a strong password for Apple ID.
— Install apps from the App Store. Do not use third-party app stores.
— Use strong and unique passwords online.
— Don’t click on links or attachments from unknown senders.
Get latest Tech and Auto news from Techlusive on our WhatsApp Channel, Facebook, X (Twitter), Instagram and YouTube.Author Name | Shweta Ganjoo
Select Language