Apple’s units are a long way higher defended in opposition to malware and viruses than different platforms, however does this imply they don’t want anti-virus device?
No, sure and possibly
I’ve misplaced monitor of the collection of instances Mac customers have informed me Macs don’t want virus coverage as a result of they’re inherently extra tough in opposition to such assaults.
I’ve additionally misplaced depend of what number of safety researchers have stated that Apple units are turning into extra at risk of being attacked as their marketplace percentage grows.
Each are proper. Each are mistaken.
The character of cyberattacks are converting.
One excellent representation of the way the character of those threats are converting comes within the type of the recently-revealed Intel processor vulnerability, ‘ZombieLoad’.
This flaw shall we hackers use design weaknesses in Intel chips (again to 2011) to scouse borrow knowledge from machines, together with Macs.
Apple in no time shipped safety patches to give protection to in contrast vulnerability and printed a detailed support document that Mac users who handle particularly sensitive data should read.
Traditional computer security models have relied on perimeter protection – that’s things like firewalls, virus checkers and malware detection.
But these defences simply aren’t robust enough to tackle or spot a threat like ZombieLoad.
Sophisticated, devious, dangerous
The important thing about ZombieLoad is that it shows how as platforms become more secure, attackers are exploring far more sophisticated ways to exploit devices.
They seek out vulnerabilities on a component level, and also engage in highly sophisticated phishing attacks that encourage people to click links that download malware to their machines.
These have interesting names – Roaming Mantis, for example, offered payloads that worked differently on different platforms – phishing for iOS and DNS-hijacking on Android. These attacks appear frequently, are fixed and then refined.
There have even been attempts to subvert device security before products leave the factory.
A hacker may have designed a one-off piece of malware, most likely in a standard programming language, that has only one function – to subvert security in a computer and download a more malware-infested package in the background – or to gather user data for a couple of weeks before sending it back to its command and control server in the middle of the night when no one is watching.
The complexity of such attacks makes it very difficult for existing anti-virus or anti-malware protections.
They may not even be aware of the code used in an attack – which means they won’t spot it.
Attackers are also finding ways to subvert things like Wi-Fi routers and poorly-secured connected home/office systems to penetrate networks.
The best defences against such attacks consist of a combination of traditional permiter defences as well as learning to use Apple’s built-in anti-phishing tools.
What does this all mean?
Existing security protections are being bypassed by highly sophisticated exploits, some of which may have been designed to be used once and never used again.
What does this mean to an Apple user?
It means complacency is no defence.
Merely because when you run a virus check application it doesn’t spot anything on your device doesn’t necessarily mean you’re safe.
There are Mac malware “kits” available for sale on the dark web for just a few dollars.
Many don’t work well, some don’t work at all, but a few work a little – though most of these rely on a user downloading and installing code, rather than traditional virus/malware attack trajectories. (‘Phishing’).
These increasingly sophisticated attacks leave little trace and are very difficult to detect using traditional permiter protections.
We’re also seeing rapid increase in attacks against component elements of the system — Check Point claims 51 percent of enterprises have seen attacks launched against their cloud backup systems, proving that if an attacker can’t hack your iPhone or Mac, they might try to subvert your cloud storage service instead.
We need to use intelligence
In this case, machine intelligence.
Modern enterprises protect themselves using complex tools from the big security vendors.
These security firms share attack data and develop monitoring systems that watch internal and externally-bound network traffic in order to spot anomalies.
Is that little-used computer in the accounts department sending a zip file in the middle of the night over the weekend? Who to? Why?
AI is helping most platform, OS and security vendors develop monitoring systems to watch for such events.
I imagine we’ll see platform providers develop and augment existing platform-based protections with AI-driven protection in future.
So, what about virus protection?
I hope I’ve made an argument that speaks to the diverse and complex nature of the modern threat landscape, but what does this tell us about running anti-virus software on iOS or Mac?
- It tells us that some of the most insidious attacks won’t be spotted by conventional protections.
- It tells us that cybercriminals focus on the weak points in the system – components, networks, and users.
- But it should also tell us that traditional permiter defenses may help us identify instances in which attacks are taking place, or have taken place.
I think its common sense to use malware and anti-virus protection as part of a package of security deterrents.
I also think it’s the digitally responsible thing to do. Checking your systems for viruses and malware isn’t just about protecting yourself, it’s also about protecting others (mostly on other platforms) you may inadvertently infect if your system carries a virus.
I’m not convinced such protections need to be ‘always-on’ when using Apple’s systems, in part because the attacks most likely to subvert those systems tend to be undefined, but also because the checkers tend to slow our systems down.
However, as the nature of cyber-attack continues to change, I think it’s important that every user does what they can to protect themselves – and others.
Also read: Apple’s security white papers, this iOS security guide, and this macOS security guide.
Please follow me on Twitter, or sign up for me within the AppleHolic’s bar & grill and Apple Discussions teams on MeWe.