What is known about malware
The program simulates real applications, so that users install it on their devices. In this case, the victim needs to use his account password to gain access. The program reads this data and passes it to the attackers. After that, they include their phone numbers in trusted ones in order to pass two-factor authentication with Apple/
Thanks to this, attackers can control the permissions of profiles, gaining 100% access to the content in it. To mask the activity, additional accounts are involved, enabling family access. Due to this, hackers can use the victim's funds.
Experts have published a warning. They wrote that when attacking a wallet that has been backed up via iCloud, there is a risk of losing cryptocurrencies.

25.07.2023
Arkham participants reported on the reward of those who find crypto wallets Up to Kwon

25.07.2023
Advantages of using the digital ruble for entrepreneurs: opinion of the head of the Chamber of Commerce and Industry

25.07.2023
Binance sent a petition regarding the rejection of the regulator's claim