Forbes reported that this information had come from UAE-based Taha Karim, a security researcher at a company known as DarkMatter, who said the intended victims came from the Gulf states – Kuwait, Bahrain, the Sultanate of Oman, Saudi Arabia and the UAE.
The attack vector was the usual phishing mail; when links within it were clicked, malware known as WindTale and WindTape from the attackers' website was downloaded to the victim's computer.
Karim claimed that the malware was able to get past native macOS security measures and could exfiltrate documents and also take screenshots of a victim's desktop.
"This actor has a dedicated and advanced spear phishing infrastructure, able to serve spear phishing emails and SMS to track individuals continuously during the reconnaissance phase, and deceiving targets during the credentials harvesting phases through the impersonation of global and local platform providers."
He said what differentiated WindShift from other APT actors was its "focus on specific individuals for espionage and surveillance purposes and their very hard-to-attribute modus operandi".
WindShift rarely engaged targets with malware. "DarkMatter uncovered very few targeted attacks from this actor and was able to uncover and analyse macOS malware used," Karim said.
"Finally, WindShift has unique macOS infection tricks abusing macOS native functionalities to automatically spread malware to targets."
iTWire has contacted DarkMatter for further comment. Forbes said it had contacted Apple for comment, but not received a response.