{"id":18914,"date":"2024-11-26T10:00:00","date_gmt":"2024-11-26T09:00:00","guid":{"rendered":"https:\/\/defenderbox.de\/?p=18914"},"modified":"2025-08-12T18:01:06","modified_gmt":"2025-08-12T16:01:06","slug":"apple","status":"publish","type":"post","link":"https:\/\/defenderbox.de\/en\/apple\/","title":{"rendered":"Attention Apple users!"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"18914\" class=\"elementor elementor-18914\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ac85e64 e-con-full e-flex e-con e-parent\" data-id=\"6ac85e64\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d3ed267 elementor-widget elementor-widget-text-editor\" data-id=\"1d3ed267\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"wp-block-heading\">Hidden cyberattack on Apple users<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>This is malware that uses various technologies, including Flutter, Go and Python, to attack macOS systems and obfuscation tactics to evade malicious code detection scans.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Are you prepared for cyber attacks?<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>With the <a href=\"https:\/\/defenderbox.de\/en\/product\/\">DEFENDERBOX<\/a> you are one step ahead of cyber threats: Strengthen your company's resistance to hacker attacks - especially in your own environment!<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Would you like to know how secure your company is? Find out with a test setup! Book now:<\/p>\n<!-- \/wp:paragraph --><!-- wp:buttons -->\n<div class=\"wp-block-buttons\"><!-- wp:button {\"backgroundColor\":\"luminous-vivid-orange\"} -->\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-luminous-vivid-orange-background-color has-background wp-element-button\" href=\"https:\/\/defenderbox.de\/en\/test-installation\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>TEST INSTALLATION<\/strong><\/a><br \/><br \/><\/div>\n<!-- \/wp:button --><\/div>\n<!-- \/wp:buttons --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Flutter &amp; Co<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>In the Flutter application, it disguises itself as a harmless app and uses the complex Flutter architecture to avoid detection. Upon execution, it sends a request to a known DPRK domain to download a second payload that can execute AppleScript codes in the next step. Attackers can use AppleScript to execute various commands on the infected macOS system. In the case under investigation, it was a Minesweeper game.\u00a0<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading -->\n<h2 class=\"wp-block-heading\">Test run?<\/h2>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>It is still unclear whether this is real malware or a test for new types of malware attacks. However, it is suspected that the malware is a test run for a larger cyber attack. The hackers responsible are known to run very convincing social engineering campaigns. They could be trying to find out whether a properly signed app with malicious code hidden in a dylib will be approved by Apple and how long it will stay under the radar of security vendors who provide generic solutions that are not specialized for OS operating systems.<\/p>\n<!-- \/wp:group -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Even Apple is not spared from cyberattacks. Apparently, this is a test run to see how macOS systems can be attacked.<\/p>","protected":false},"author":3,"featured_media":18915,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[28],"tags":[41,39,38,40,37,36],"class_list":["post-18914","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-neues-auf-der-cyberfront","tag-cyberlage","tag-cybersecurity","tag-cybersicherheit","tag-hackerangriffe","tag-schwachstellen","tag-sicherheitsluecken"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple User aufgepasst! - DEFENDERBOX<\/title>\n<meta name=\"description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/defenderbox.de\/en\/apple\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple User aufgepasst! - DEFENDERBOX\" \/>\n<meta property=\"og:description\" content=\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit &amp; Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/defenderbox.de\/en\/apple\/\" \/>\n<meta property=\"og:site_name\" content=\"DEFENDERBOX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/de.linkedin.com\/company\/defenderbox\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-26T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T16:01:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/apple-1475977_1280.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1133\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Regine Heue\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Regine Heue\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/apple\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/apple\\\/\"},\"author\":{\"name\":\"Regine Heue\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\"},\"headline\":\"Apple User aufgepasst!\",\"datePublished\":\"2024-11-26T09:00:00+00:00\",\"dateModified\":\"2025-08-12T16:01:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/apple\\\/\"},\"wordCount\":250,\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/apple\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/apple-1475977_1280.png\",\"keywords\":[\"Cyberlage\",\"Cybersecurity\",\"Cybersicherheit\",\"Hackerangriffe\",\"Schwachstellen\",\"Sicherheitsl\u00fccken\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/apple\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/apple\\\/\",\"name\":\"Apple User aufgepasst! - DEFENDERBOX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/apple\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/apple\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/apple-1475977_1280.png\",\"datePublished\":\"2024-11-26T09:00:00+00:00\",\"dateModified\":\"2025-08-12T16:01:06+00:00\",\"description\":\"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/apple\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/defenderbox.de\\\/apple\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/apple\\\/#primaryimage\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/apple-1475977_1280.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/apple-1475977_1280.png\",\"width\":1280,\"height\":1133,\"caption\":\"MalwareAttacke auf Apple User\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/apple\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/defenderbox.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple User aufgepasst!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#website\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"name\":\"DEFENDERBOX\",\"description\":\"Cybersecurity at its best.\",\"publisher\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/defenderbox.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#organization\",\"name\":\"DEFENDERBOX\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"contentUrl\":\"https:\\\/\\\/defenderbox.de\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/cropped-Logo_Claim-400_116.png\",\"width\":400,\"height\":110,\"caption\":\"DEFENDERBOX\"},\"image\":{\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/de.linkedin.com\\\/company\\\/defenderbox\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/defenderbox.de\\\/#\\\/schema\\\/person\\\/b83407c671731c92428913089813ab49\",\"name\":\"Regine Heue\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g\",\"caption\":\"Regine Heue\"},\"sameAs\":[\"http:\\\/\\\/defenderbox.de\"],\"url\":\"https:\\\/\\\/defenderbox.de\\\/en\\\/author\\\/regine-heue\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attention Apple users! - DEFENDERBOX","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/defenderbox.de\/en\/apple\/","og_locale":"en_US","og_type":"article","og_title":"Apple User aufgepasst! - DEFENDERBOX","og_description":"DEFENDERBOX: Ihr Partner f\u00fcr IT-Sicherheit & Compliance. Proaktive Cybersecurity-L\u00f6sung f\u00fcr den Mittelstand, NGOs und \u00f6ffentlichen Sektor. Jetzt Cyber-Widerstandsf\u00e4higkeit st\u00e4rken.","og_url":"https:\/\/defenderbox.de\/en\/apple\/","og_site_name":"DEFENDERBOX","article_publisher":"https:\/\/de.linkedin.com\/company\/defenderbox","article_published_time":"2024-11-26T09:00:00+00:00","article_modified_time":"2025-08-12T16:01:06+00:00","og_image":[{"width":1280,"height":1133,"url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/apple-1475977_1280.png","type":"image\/png"}],"author":"Regine Heue","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Regine Heue","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/defenderbox.de\/apple\/#article","isPartOf":{"@id":"https:\/\/defenderbox.de\/apple\/"},"author":{"name":"Regine Heue","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49"},"headline":"Apple User aufgepasst!","datePublished":"2024-11-26T09:00:00+00:00","dateModified":"2025-08-12T16:01:06+00:00","mainEntityOfPage":{"@id":"https:\/\/defenderbox.de\/apple\/"},"wordCount":250,"publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"image":{"@id":"https:\/\/defenderbox.de\/apple\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/apple-1475977_1280.png","keywords":["Cyberlage","Cybersecurity","Cybersicherheit","Hackerangriffe","Schwachstellen","Sicherheitsl\u00fccken"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/defenderbox.de\/apple\/","url":"https:\/\/defenderbox.de\/apple\/","name":"Attention Apple users! - DEFENDERBOX","isPartOf":{"@id":"https:\/\/defenderbox.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/defenderbox.de\/apple\/#primaryimage"},"image":{"@id":"https:\/\/defenderbox.de\/apple\/#primaryimage"},"thumbnailUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/apple-1475977_1280.png","datePublished":"2024-11-26T09:00:00+00:00","dateModified":"2025-08-12T16:01:06+00:00","description":"DEFENDERBOX: Your Partner for IT Security &amp; Compliance. Proactive Cybersecurity Solution for Small and Medium-sized Businesses, NGOs, and the Public Sector. Strengthen Cyber Resilience Now.","breadcrumb":{"@id":"https:\/\/defenderbox.de\/apple\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/defenderbox.de\/apple\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/apple\/#primaryimage","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/apple-1475977_1280.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/11\/apple-1475977_1280.png","width":1280,"height":1133,"caption":"MalwareAttacke auf Apple User"},{"@type":"BreadcrumbList","@id":"https:\/\/defenderbox.de\/apple\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/defenderbox.de\/"},{"@type":"ListItem","position":2,"name":"Apple User aufgepasst!"}]},{"@type":"WebSite","@id":"https:\/\/defenderbox.de\/#website","url":"https:\/\/defenderbox.de\/","name":"DEFENDERBOX","description":"Cybersecurity at its best.","publisher":{"@id":"https:\/\/defenderbox.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/defenderbox.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/defenderbox.de\/#organization","name":"DEFENDERBOX","url":"https:\/\/defenderbox.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/","url":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","contentUrl":"https:\/\/defenderbox.de\/wp-content\/uploads\/2024\/08\/cropped-Logo_Claim-400_116.png","width":400,"height":110,"caption":"DEFENDERBOX"},"image":{"@id":"https:\/\/defenderbox.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/de.linkedin.com\/company\/defenderbox"]},{"@type":"Person","@id":"https:\/\/defenderbox.de\/#\/schema\/person\/b83407c671731c92428913089813ab49","name":"Regine Heue","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/229aff465565b2ec40968fea9d60687f0298ac3de5d0c39eeb1b385e3b6eabaf?s=96&d=mm&r=g","caption":"Regine Heue"},"sameAs":["http:\/\/defenderbox.de"],"url":"https:\/\/defenderbox.de\/en\/author\/regine-heue\/"}]}},"_links":{"self":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/18914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/comments?post=18914"}],"version-history":[{"count":0,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/posts\/18914\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media\/18915"}],"wp:attachment":[{"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/media?parent=18914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/categories?post=18914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defenderbox.de\/en\/wp-json\/wp\/v2\/tags?post=18914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}