In this chapter, we learned about the security models of macOS and iOS to understand the potential attack vectors, and dived deep into file formats used on these operating systems to see what malicious samples look like. Then we went through the tools available to analyze malware that targets macOS and iOS users and provided guidelines on how they can be used. After this, we put our knowledge into practice and went through all major attack stages generally implemented in malware, from the initial penetration to the action phase, and learned how they may look in real-life scenarios. Finally, we covered advanced techniques utilized by more high-profile malware families.
Equipped with this knowledge, you now have the upper hand in analyzing pretty much any type of threat that targets these systems. As a result, you can provide better protection from unwarranted cyberattacks and mitigate further risks.
In Chapter 12, Analyzing Android Malware Samples, we are going to cover another...