Many Australian small businesses choose Apple devices, partly due to the perception that macOS is inherently more secure, less prone to malware, and generally ‘just works’. While Apple’s built-in security features are robust, relying solely on them, particularly against sophisticated threats like info-stealers, is a critical misstep. It fosters a dangerous complacency.
The truth is, no operating system is impervious. Cybercriminals constantly evolve, and their most effective weapon often isn’t a technical exploit, but human error.
Apple’s Gatekeeper is a valuable defence mechanism. It’s designed to ensure that only trusted software runs on your Mac. It checks for Developer ID signatures and Apple’s notarisation service, effectively blocking most common, unsigned malware.
However, Gatekeeper has a significant blind spot: user action. Recent campaigns demonstrate how attackers bypass this security layer by tricking users into executing malicious commands themselves. Imagine a fraudulent “macOS help” website appearing in search results. It might instruct a user to copy and paste a one-line command into their Terminal to “fix” an issue. Once executed, this command can download and install an info-stealer, like a variant of Atomic macOS Stealer (AMOS), directly onto the device, completely bypassing Gatekeeper’s checks. It’s not a software vulnerability; it’s a human vulnerability.
Info-stealers are insidious. These types of malware are designed to quietly pilfer sensitive data: login credentials, financial information, cryptocurrency wallet keys, browser data, and personal files. They operate in the background, often undetected until the damage is done.
For an Australian small business, an info-stealer infection means:
Attackers know that the easiest path to your data isn’t always through your operating system’s code; it’s through the person using it. Social engineering, malvertising, and sophisticated phishing campaigns are designed to exploit trust, urgency, or curiosity.
Even the most advanced technical controls are only as strong as the human operating the keyboard. This aligns with our view that your staff, not just your tech, are your ultimate phishing defence.
To truly protect your business against info-stealers and other modern threats, you need to empower your team. Here’s how:
Relying solely on one security feature, on one operating system, is insufficient. Effective cyber risk management for an SME cyber security posture requires a holistic approach. The ACSC Essential Eight framework provides an excellent baseline for enhancing your defences, with user education being a critical component.
Remember, even cutting-edge security, like a FIDO key, isn’t foolproof if a user is tricked into authorising a malicious action. Consider why your ‘unphishable’ security key isn’t enough if the human element is compromised.
The perceived security of macOS is no substitute for active vigilance. For Australian small businesses, protecting sensitive data and avoiding a notifiable data breach hinges on robust technology and a well-trained, alert workforce. Don’t just rely on Gatekeeper to do all the heavy lifting; empower your team with the knowledge and skills to be your front line of defence.
Effective phishing training and continuous employee phishing test programs are crucial. They build a culture of security, turning every employee into a conscious guardian against threats.
Launch a realistic phishing simulation in minutes and get the tools you need to build a cyber-aware team.
This blog offers general information about phishing and cybersecurity for small and medium-sized organisations. It is not legal, financial, or technical advice. Speak to a qualified professional before acting on any guidance you read here.