Home » Technology » Security Experts Warn of Increased Cyber Threats and Adware Risks on Apple Devices

Security Experts Warn of Increased Cyber Threats and Adware Risks on Apple Devices

“MinaUSB patcher app promised users the ability to break security features on Apple devices such as iPod, iPhone or iPad. This breaking of the manufacturer’s numerical lock is called a jailbreak, and thanks to this step, users would get, among other things, the ability to download applications from outside the App Store to their devices, which Apple does not allow under standard circumstances,” explained Jiří Kropáč, head of the Eset virus laboratory in Brno.

Jailbreak is therefore a modification of the operating system. “On the one hand, the user gets the highest privileges, but on the other hand, it exposes their device to attacks because it unlocks access to sensitive parts of the device. Jailbreaking allows users to install apps on their iPhone or iPad that are not available in the official App Store, but this means that they will no longer be protected if such an app is unsafe. In addition, performing a jailbreak is considered a violation of the license agreement,” the security expert stated.

Pirrit has dramatically strengthened, security experts sound the alarm

Nevertheless, people are very interested in jailbreak, which cybercriminals have decided to exploit in the past weeks in the Czech Republic and Slovakia. “The attackers targeted users of the macOS platform probably because it allows downloads outside of the official store and because all Apple products can be conveniently linked together. However, the fake application only faked the supposed functionality and failed to unlock the device. She only installed adware on the computer, which can then track users’ activities on the Internet,” said Kropáč.

At the same time, he pointed out that the Pirrit adware has long been one of the most widespread malicious codes for the macOS platform in the Czech Republic and Slovakia. This was not the case even in the past month, when it was the second most widespread threat in the country with a share of 3.27%.

Don’t underestimate adware

“Adware Pirrit is a classic representative of codes that display aggressive ads. Users usually download it to their devices themselves and voluntarily, often as part of other programs or games that attackers offer in third-party stores or various Internet repositories for free or in advantageous packages,” the security expert pointed out.

This may also be due to the fact that users do not consider adware to be very harmful and do not pay much attention to similar types of uninvited visitors. Excessive display of advertising in the case of adware is not as unpleasant as an encrypted disk, which can be done, for example, by ransomware viruses.

Throughout its existence, adware can be a real risk to our privacy and our data

Jiří Kropáč, head of the ESET virus laboratory in Brno

But this approach can backfire on people in the long run. “Adware is difficult to detect on a device and usually only shows itself at the moment when the device has performance problems and working on it is unpleasant due to the amount of displayed advertising,” said Kropáč.

“However, throughout its existence, adware can be a real risk to our privacy and our data – a highly sought-after commodity that is highly prized by cybercriminal groups. Users should therefore invest in high-quality security and thus properly protect their data,” the security expert concluded.

Fraudsters are playing journalists

Users should beware of various investment scams in which attackers misuse the name of the news server Novinky.cz. Fraudsters usually attract easy earnings in connection with well-known personalities. In recent months, for example, fake articles featuring President Petr Pavlo or moderator Jan Kraus have appeared.

However, this is a typical phishing scam, where attackers try to extort money from people under the guise of easy profit. However, the scam is quite sophisticated, all the links in the fake article lead to another fraudulent website.

In order to confuse the trusting person as much as possible, cybercriminals in some cases do not want him to immediately fill in credit card numbers or send any money. Everything starts with registration on the given platform, after which the user will be contacted by the platform administrator. It is only with his help that money is coaxed from the trusting. You don’t have to contact him only by e-mail, but also by phone.

Photo: News

With the new year, the number of cyber incidents in the Czech Republic increased

2024-02-17 05:16:00
#promised #unlock #iPhone #Trustees #installed #virus #News

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.