The Cabinet Division has issued a Cybersecurity Advisory on potential zero-day attacks on Apple equipment. Kaspersky detected irregularities during Pegasus-related device reboots by analysing the Shutdown.log file in the sysdiagnose archive.
The log file entries suggested reboot delays due to continuous malware processes.
In addition, a common infection path was found in the log file, similar to other iOS malware families. The advice proposes many mitigating methods to protect iOS devices against advanced spyware.
These include restarting the device daily to disrupt potential attackers, enabling lockdown mode to block iOS malware, disabling iMessage and FaceTime to minimise exploitation vectors.
Exercising caution with suspicious links received via various communication channels, regularly checking backups and system diagnoses for signs of malware, ensuring the installation of the latest OS version and application updates, and using Kaspersky’s self-check spyware detection tool.
The Cabinet Division has directed federal and provincial ministries and divisions to communicate this information throughout their organisations, including attached/affiliated departments, and to ensure that all essential preventive measures are implemented.
To read our blog on “Apple smacked with $2 billion monopoly penalties,” click here