Welcome to the First Column IT Tech Blog

HomeBlog
What is the Apple Mercenary Attack, and Why Should You Care?

What is the Apple Mercenary Attack, and Why Should You Care?

April 24, 2024

Apple rarely sends out alerts about threats, and that is because threats that target Apple devices are somewhat rare in the first place. However, on April 10, 2024, Apple saw fit to send one to certain users in 92 nations by email. These notifications were “designed to inform and assist users who may have been individually targeted by mercenary spyware attacks.” What does this mean, exactly?

Understanding Mercenary Attacks

Your typical cyberattack might be launched without any specific target in mind. Mercenary attacks, however, will be backed by millions of dollars and target a small group of victims. The threat notification email states, “This attack is likely targeting you specifically because of who you are or what you do.”

The email also states what this attack will likely do: "If your device is compromised by a targeted mercenary spyware attack, the attacker may be able to remotely access your sensitive data, communications, or even the camera and microphone."

Has Apple Addressed the Problem?

For starters, Apple has created a support page explaining what users should do if they think the threat has infected their device. This page consists of various best practices:

  • “Update devices to the latest software, as that includes the latest security fixes
  • Protect devices with a passcode
  • Use two-factor authentication and a strong password for Apple ID [we just want to add you should do this with all accounts]
  • Install apps from the App Store [all Android users should only utilize the Google Play store]
  • Use strong and unique passwords online
  • Don’t click on links or attachments from unknown senders”

Apple has also suggested that users who think they might be targeted turn on Lockdown Mode, a setting that limits the device to specific functions and reduces the likelihood of an attack from these types of threats.

While we certainly hope you don’t get struck by these attacks, we want to raise awareness and ensure that as many people know about them as possible. Follow our blog for more notifications of high-profile threats and all things related to business IT.

Previous Post
November 26, 2025
How Manufacturing IT Prevents Pricey Maintenance and Repair
Manufacturing equipment costs a pretty penny, so you naturally expect it to drive profits and yield a return on investment. Yet, how often do these machines break down and cost you more than they should? By the time the red light turns on that tells you something’s wrong, you’ve already wasted precious time that you could have been saving with proactive, preventative maintenance.
November 24, 2025
How to Keep Your IT From Holding You Back
Many businesses think of IT as nothing but an expense, often represented by losses on your budgeting reports. You might dump countless dollars into your IT only for it to eat it all up without providing any discernible return on investment. Here’s the truth about IT: when it’s managed properly, it can represent opportunity and investment rather than expense.
November 22, 2025
The Endpoint: Your Network's First Line of Defense
We see the endpoint—that includes every laptop, desktop, server, mobile device, and IoT gadget connected to your network—as the front line of your defense. Failing to secure every single one of these points is not just a risk; it's an invitation. You need to identify all the endpoints on your network and work to secure them. Here’s why, and how.

Have a project in mind?

Start with our free consultation for VA, DC and MD companies. We will provide a detailed proposal and firm quote based on your specific IT support needs. All at a predictable monthly cost per seat.
Free Consultation - Sign Up Here