{"id":57485,"date":"2026-04-22T11:34:27","date_gmt":"2026-04-22T01:34:27","guid":{"rendered":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/"},"modified":"2026-04-22T11:36:05","modified_gmt":"2026-04-22T01:36:05","slug":"the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters","status":"publish","type":"post","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/","title":{"rendered":"The North Korean Threat Actor Now Targeting macOS Fleets \u2014 and Why Your Intune for Mac Baseline Matters"},"content":{"rendered":"<p>For years, Australian IT leaders treated macOS as the &#8220;quiet corner&#8221; of the fleet. A handful of executives and designers on MacBooks, a sprinkle of engineers, and a general assumption that Apple&#8217;s built-in protections were enough.<\/p>\n\n<p>That assumption no longer holds. In April 2026, Microsoft Threat Intelligence publicly dissected a campaign by Sapphire Sleet \u2014 a North Korean crew aligned with Lazarus Group \u2014 targeting macOS users with a fake Zoom SDK update. A few weeks earlier, Google&#8217;s Mandiant team documented UNC1069 dropping seven distinct macOS malware families onto a single victim&#8217;s Mac in a coordinated credential and wallet heist.<\/p>\n\n<p>Two separate DPRK (Democratic People&#8217;s Republic of Korea) clusters. Two active macOS intrusion chains. Both relying on social engineering rather than exploits. And both pointing at the same uncomfortable conclusion: Australian organisations running unmanaged or lightly managed Mac fleets are now soft targets for a state-sponsored threat actor.<\/p>\n\n<p>Our team has been helping mid-market Australian businesses harden their macOS posture through Microsoft Intune, and the recent reporting reinforces why that baseline is no longer optional.<\/p>\n\n<h2 class=\"wp-block-heading\">What DPRK Actors Are Actually Doing to Macs in 2026<\/h2>\n\n<p>Ten years ago, the Mac threat landscape was dominated by adware and the occasional supply chain surprise. The DPRK campaigns documented through late 2025 and into 2026 look nothing like that.<\/p>\n\n<p><strong>Sapphire Sleet&#8217;s Zoom SDK lure (April 2026).<\/strong> The attackers pose as recruiters or legitimate contacts on LinkedIn, schedule a &#8220;technical interview&#8221; on Zoom, and deliver a file named <code>Zoom SDK Update.scpt<\/code>. macOS opens it in Script Editor by default. Below thousands of blank lines sits a multi-stage chain of <code>curl<\/code> commands that pull fresh AppleScript payloads, bypass macOS Transparency, Consent and Control (TCC), drop a backdoor named <code>com.apple.cli<\/code>, and exfiltrate keychains, browser data, Apple Notes, Telegram sessions, and cryptocurrency wallets \u2014 all via the Telegram Bot API.<\/p>\n\n<p><strong>UNC1069&#8217;s seven-family ClickFix campaign (February 2026).<\/strong> Mandiant responded to an incident at a fintech where a single victim was contacted over Telegram from a compromised executive account. A deepfake Zoom call was used as the pretext. The user was walked through &#8220;troubleshooting&#8221; commands that kicked off an AppleScript-driven infection chain dropping WAVESHAPER, HYPERCALL, HIDDENCALL, SILENCELIFT, DEEPBREATH, SUGARLOADER, and CHROMEPUSH. Several of these bypass TCC by modifying the TCC database directly.<\/p>\n\n<p><strong>Contagious Interview and malicious VS Code projects (January 2026).<\/strong> Jamf Threat Labs and Microsoft Defender researchers documented developers being sent fake &#8220;coding assessment&#8221; repositories via Bitbucket, GitHub, and GitLab. The repositories abuse VS Code task configuration files to execute payloads on macOS. Separately, North Korean operators pushed nearly 200 malicious npm packages in late November 2025, merging features from the well-known BeaverTail and OtterCookie malware families.<\/p>\n\n<p><strong>The classic lineage is still active.<\/strong> RustBucket, KandyKorn, ObjCShellz, and BeaverTail remain in circulation, now joined by newer loaders like SUGARLOADER and credential stealers dropped through fake <code>systemupdate.app<\/code> bundles.<\/p>\n\n<p>The common thread across all of this is that users \u2014 not unpatched software \u2014 are the initial access vector. And the payloads are increasingly Mach-O binaries, AppleScript chains, and TCC-bypass techniques designed specifically for Apple Silicon fleets.<\/p>\n\n<h2 class=\"wp-block-heading\">Why Australian Mid-Market Organisations Are in Scope<\/h2>\n\n<p>The early DPRK macOS campaigns focused heavily on crypto exchanges and Web3 companies. That is no longer the boundary.<\/p>\n\n<p>In the Mandiant reporting, UNC1069 has pivoted to financial services, payments, brokerage, and wallet infrastructure. Sapphire Sleet&#8217;s current lures target anyone with access to financial data or corporate identity. Lazarus was also linked to Medusa ransomware attacks on a healthcare organisation in the U.S. and European defence companies in the past six months.<\/p>\n\n<p>For Australian organisations in the 50\u2013500 employee band \u2014 law firms, accounting practices, super funds, medtech, fintech, professional services \u2014 the attack surface is now:<\/p>\n\n<ul class=\"wp-block-list\"><li>Executives and partners on MacBooks with access to financial systems<\/li><li>Developers and engineers using Macs for anything touching code repositories or CI\/CD<\/li><li>Finance and operations staff with access to banking, payments, or payroll<\/li><li>Anyone active on LinkedIn who might be approached with a &#8220;recruiter&#8221; pitch<\/li><\/ul>\n\n<p>If any of the above runs on a Mac that is not centrally managed, MDM-enrolled, and covered by a hardened baseline, the organisation is essentially betting on user judgement against a well-resourced state-sponsored adversary. The Australian Signals Directorate (ASD) and the Australian Cyber Security Centre (ACSC) have been increasingly direct on this point through 2025 and into 2026: the Essential 8 applies to every managed endpoint, not just the Windows ones.<\/p>\n\n<h2 class=\"wp-block-heading\">The Intune for macOS Baseline Our Team Recommends<\/h2>\n\n<p>Intune has matured significantly as a macOS management plane. The features that matter for the current DPRK threat model are not exotic \u2014 they are the baseline controls every managed Mac fleet should already have in place.<\/p>\n\n<p><strong>1. Enforced MDM enrolment via Apple Business Manager.<\/strong> Automated Device Enrolment (ADE) ensures every Mac \u2014 company-owned or contractor \u2014 hits the fleet already supervised, with the user unable to remove management. Without this, none of the controls below can be reliably enforced.<\/p>\n\n<p><strong>2. Compliance policies with FileVault, system integrity, and OS version requirements.<\/strong> Intune compliance policies can require FileVault encryption, minimum macOS version, System Integrity Protection (SIP) enabled, and Gatekeeper set to App Store and identified developers only. Non-compliant devices can then be blocked from Microsoft 365 and other Entra-integrated apps through Conditional Access.<\/p>\n\n<p><strong>3. Platform Single Sign-On with Entra ID.<\/strong> Platform SSO binds the macOS local account to Entra ID, enforces phishing-resistant authentication, and makes credential theft from the keychain far less valuable. Given that DEEPBREATH and CHROMEPUSH both target keychain and browser credentials, Platform SSO is one of the highest-leverage controls available right now.<\/p>\n\n<p><strong>4. Microsoft Defender for Endpoint on Mac.<\/strong> Defender for Endpoint provides EDR telemetry, behavioural detection, and integration with Microsoft 365 Defender. It catches the kinds of post-compromise behaviours \u2014 suspicious <code>osascript<\/code> execution, <code>curl<\/code> fetching Mach-O binaries, TCC database tampering \u2014 that XProtect alone will miss. Apple has pushed XProtect signatures for the Sapphire Sleet families, but signature-based detection is not a substitute for EDR on a business-critical device.<\/p>\n\n<p><strong>5. App allow-listing and script execution controls.<\/strong> Intune shell script deployment combined with configuration profiles can restrict where unsigned scripts execute, enforce notarisation requirements, and disable Script Editor for standard users where business use does not require it. This directly disrupts the <code>Zoom SDK Update.scpt<\/code> style lure.<\/p>\n\n<p><strong>6. Hardened TCC and privacy preference profiles.<\/strong> Intune configuration profiles can pre-approve only the TCC permissions required by sanctioned apps and prevent users from granting Full Disk Access, Accessibility, or Screen Recording privileges to arbitrary binaries. This is the single most effective control against the TCC-bypass techniques used by DEEPBREATH and the Sapphire Sleet payload chain.<\/p>\n\n<p><strong>7. Developer workstation separation.<\/strong> Macs used by developers should be treated as a distinct device group with stricter controls on VS Code extensions, source control clients, and package manager behaviour. Given the npm and VS Code project lures documented in the Contagious Interview campaigns, this is no longer a theoretical concern.<\/p>\n\n<p>Mapped against the Essential 8, this baseline directly strengthens application control, restrict administrative privileges, patch applications, patch operating systems, and multi-factor authentication on macOS \u2014 which is historically where Essential 8 implementations have been weakest in Australian mid-market environments.<\/p>\n\n<h2 class=\"wp-block-heading\">Practical Starting Point<\/h2>\n\n<p>The organisations our team works with typically fall into one of three postures on macOS:<\/p>\n\n<ul class=\"wp-block-list\"><li><strong>No management<\/strong> \u2014 Macs purchased through reseller or direct, handed to users, no enrolment. This is where most breaches happen.<\/li><li><strong>Light management<\/strong> \u2014 JAMF or Kandji in place for provisioning, but no Conditional Access, no Defender for Endpoint, no Platform SSO, and no alignment with the Essential 8.<\/li><li><strong>Full Intune baseline<\/strong> \u2014 ABM + ADE, compliance policies, Conditional Access, Defender for Endpoint, Platform SSO, hardened TCC profiles, and monitored through Microsoft 365 Defender.<\/li><\/ul>\n\n<p>Moving from posture one or two to a full baseline is not a six-month transformation programme. For a 50\u2013500 person organisation, it is typically a focused engagement of a few weeks to get the core controls in place, followed by ongoing hardening as new Intune capabilities land.<\/p>\n\n<p>The DPRK threat actors are not going to slow down. Social engineering is, as Microsoft&#8217;s global threat intelligence GM recently put it, <em>&#8220;low-cost, hard to patch, and scales well.&#8221;<\/em> Australian organisations that get their macOS baseline in order now are the ones that will not be the next case study.<\/p>\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n<p>If your organisation runs macOS devices and you are not sure how your current controls map to the Essential 8 or stand up against the current DPRK threat model, we would welcome a conversation. Our team regularly helps Australian mid-market organisations design and deploy Intune for macOS baselines aligned with ACSC guidance and the Essential 8.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>For years, Australian IT leaders treated macOS as the &#8220;quiet corner&#8221; of the fleet. A handful of executives and designers on MacBooks, a sprinkle of engineers, and a general assumption that Apple&#8217;s built-in protections were enough. That assumption no longer holds. In April 2026, Microsoft Threat Intelligence publicly dissected a campaign by Sapphire Sleet \u2014 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"Intune for macOS baseline","_yoast_wpseo_title":"Intune for macOS Baseline vs North Korean Threats | CloudProInc","_yoast_wpseo_metadesc":"North Korean threat actors are now targeting macOS fleets. Learn why an Intune for macOS baseline is essential for Australian mid-market organisations in 2026.","_yoast_wpseo_opengraph-title":"Intune for macOS Baseline vs North Korean Threats","_yoast_wpseo_opengraph-description":"DPRK actors like Sapphire Sleet and UNC1069 are targeting macOS. See why an Intune for macOS baseline aligned with Essential 8 matters now.","_yoast_wpseo_twitter-title":"Intune for macOS Baseline vs North Korean Threats","_yoast_wpseo_twitter-description":"DPRK actors like Sapphire Sleet and UNC1069 are targeting macOS. See why an Intune for macOS baseline aligned with Essential 8 matters now.","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[13,107,103,17,29,12],"tags":[],"class_list":["post-57485","post","type-post","status-publish","format-standard","hentry","category-blog","category-cybersecurity","category-essential-8","category-microsoft-365-security","category-microsoft-defender-xdr","category-microsoft-intune"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Intune for macOS Baseline vs North Korean Threats | CloudProInc<\/title>\n<meta name=\"description\" content=\"North Korean threat actors are now targeting macOS fleets. Learn why an Intune for macOS baseline is essential for Australian mid-market organisations in 2026.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intune for macOS Baseline vs North Korean Threats\" \/>\n<meta property=\"og:description\" content=\"DPRK actors like Sapphire Sleet and UNC1069 are targeting macOS. See why an Intune for macOS baseline aligned with Essential 8 matters now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/\" \/>\n<meta property=\"og:site_name\" content=\"CPI Consulting\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-22T01:34:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-22T01:36:05+00:00\" \/>\n<meta name=\"author\" content=\"CPI Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Intune for macOS Baseline vs North Korean Threats\" \/>\n<meta name=\"twitter:description\" content=\"DPRK actors like Sapphire Sleet and UNC1069 are targeting macOS. See why an Intune for macOS baseline aligned with Essential 8 matters now.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CPI Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/22\\\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/22\\\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\\\/\"},\"author\":{\"name\":\"CPI Staff\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\"},\"headline\":\"The North Korean Threat Actor Now Targeting macOS Fleets \u2014 and Why Your Intune for Mac Baseline Matters\",\"datePublished\":\"2026-04-22T01:34:27+00:00\",\"dateModified\":\"2026-04-22T01:36:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/22\\\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\\\/\"},\"wordCount\":1393,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\"},\"articleSection\":[\"Blog\",\"Cybersecurity\",\"Essential 8\",\"Microsoft 365 Security\",\"Microsoft defender XDR\",\"Microsoft Intune\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/22\\\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/22\\\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\\\/\",\"url\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/22\\\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\\\/\",\"name\":\"Intune for macOS Baseline vs North Korean Threats | CloudProInc\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#website\"},\"datePublished\":\"2026-04-22T01:34:27+00:00\",\"dateModified\":\"2026-04-22T01:36:05+00:00\",\"description\":\"North Korean threat actors are now targeting macOS fleets. Learn why an Intune for macOS baseline is essential for Australian mid-market organisations in 2026.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/22\\\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/22\\\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/index.php\\\/2026\\\/04\\\/22\\\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cloudproinc.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The North Korean Threat Actor Now Targeting macOS Fleets \u2014 and Why Your Intune for Mac Baseline Matters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#website\",\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/\",\"name\":\"Cloud Pro Inc - CPI Consulting Pty Ltd\",\"description\":\"Cloud, AI &amp; Cybersecurity Consulting | Melbourne\",\"publisher\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cloudproinc.com.au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#organization\",\"name\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\",\"url\":\"https:\\\/\\\/cloudproinc.com.au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/favfinalfile.png\",\"width\":500,\"height\":500,\"caption\":\"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd\"},\"image\":{\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cloudproinc.com.au\\\/#\\\/schema\\\/person\\\/192eeeb0ce91062126ce3822ae88fe6e\",\"name\":\"CPI Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g\",\"caption\":\"CPI Staff\"},\"sameAs\":[\"http:\\\/\\\/www.cloudproinc.com.au\"],\"url\":\"https:\\\/\\\/cloudproinc.azurewebsites.net\\\/index.php\\\/author\\\/cpiadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Intune for macOS Baseline vs North Korean Threats | CloudProInc","description":"North Korean threat actors are now targeting macOS fleets. Learn why an Intune for macOS baseline is essential for Australian mid-market organisations in 2026.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/","og_locale":"en_US","og_type":"article","og_title":"Intune for macOS Baseline vs North Korean Threats","og_description":"DPRK actors like Sapphire Sleet and UNC1069 are targeting macOS. See why an Intune for macOS baseline aligned with Essential 8 matters now.","og_url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/","og_site_name":"CPI Consulting","article_published_time":"2026-04-22T01:34:27+00:00","article_modified_time":"2026-04-22T01:36:05+00:00","author":"CPI Staff","twitter_card":"summary_large_image","twitter_title":"Intune for macOS Baseline vs North Korean Threats","twitter_description":"DPRK actors like Sapphire Sleet and UNC1069 are targeting macOS. See why an Intune for macOS baseline aligned with Essential 8 matters now.","twitter_misc":{"Written by":"CPI Staff","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/#article","isPartOf":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/"},"author":{"name":"CPI Staff","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e"},"headline":"The North Korean Threat Actor Now Targeting macOS Fleets \u2014 and Why Your Intune for Mac Baseline Matters","datePublished":"2026-04-22T01:34:27+00:00","dateModified":"2026-04-22T01:36:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/"},"wordCount":1393,"commentCount":0,"publisher":{"@id":"https:\/\/cloudproinc.com.au\/#organization"},"articleSection":["Blog","Cybersecurity","Essential 8","Microsoft 365 Security","Microsoft defender XDR","Microsoft Intune"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/","url":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/","name":"Intune for macOS Baseline vs North Korean Threats | CloudProInc","isPartOf":{"@id":"https:\/\/cloudproinc.com.au\/#website"},"datePublished":"2026-04-22T01:34:27+00:00","dateModified":"2026-04-22T01:36:05+00:00","description":"North Korean threat actors are now targeting macOS fleets. Learn why an Intune for macOS baseline is essential for Australian mid-market organisations in 2026.","breadcrumb":{"@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudproinc.com.au\/index.php\/2026\/04\/22\/the-north-korean-threat-actor-now-targeting-macos-fleets-and-why-your-intune-for-mac-baseline-matters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudproinc.com.au\/"},{"@type":"ListItem","position":2,"name":"The North Korean Threat Actor Now Targeting macOS Fleets \u2014 and Why Your Intune for Mac Baseline Matters"}]},{"@type":"WebSite","@id":"https:\/\/cloudproinc.com.au\/#website","url":"https:\/\/cloudproinc.com.au\/","name":"Cloud Pro Inc - CPI Consulting Pty Ltd","description":"Cloud, AI &amp; Cybersecurity Consulting | Melbourne","publisher":{"@id":"https:\/\/cloudproinc.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudproinc.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cloudproinc.com.au\/#organization","name":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd","url":"https:\/\/cloudproinc.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/logo\/image\/","url":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","contentUrl":"\/wp-content\/uploads\/2022\/01\/favfinalfile.png","width":500,"height":500,"caption":"Cloud Pro Inc - Cloud Pro Inc - CPI Consulting Pty Ltd"},"image":{"@id":"https:\/\/cloudproinc.com.au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cloudproinc.com.au\/#\/schema\/person\/192eeeb0ce91062126ce3822ae88fe6e","name":"CPI Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2d96eeb53b791d92c8c50dd667e3beec92c93253bb6ff21c02cfa8ca73665c70?s=96&d=mm&r=g","caption":"CPI Staff"},"sameAs":["http:\/\/www.cloudproinc.com.au"],"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/author\/cpiadmin\/"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":53831,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2025\/09\/15\/manage-macos-byod-devices-with-microsoft-intune\/","url_meta":{"origin":57485,"position":0},"title":"Manage macOS BYOD Devices with Microsoft Intune","author":"CPI Staff","date":"September 15, 2025","format":false,"excerpt":"A practical guide to enroll, secure, and support personal Macs with Intune\u2014without ruining the user experience or sacrificing privacy.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 1x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 1.5x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 2x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 3x, \/wp-content\/uploads\/2025\/09\/manage-macos-byod-devices-with-microsoft-intune-the-right-way.png 4x"},"classes":[]},{"id":56932,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/01\/enforce-device-compliance-with-microsoft-intune\/","url_meta":{"origin":57485,"position":1},"title":"Enforce Device Compliance with Microsoft Intune","author":"CPI Staff","date":"February 1, 2026","format":false,"excerpt":"Learn how Intune compliance policies and Entra Conditional Access work together to keep data secure. Follow practical steps to define requirements, remediate drift, and block risky devices.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/02\/post-2.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/02\/post-2.png 1x, \/wp-content\/uploads\/2026\/02\/post-2.png 1.5x, \/wp-content\/uploads\/2026\/02\/post-2.png 2x, \/wp-content\/uploads\/2026\/02\/post-2.png 3x, \/wp-content\/uploads\/2026\/02\/post-2.png 4x"},"classes":[]},{"id":56951,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/02\/04\/how-python-info-stealers-are-targeting-macos-endpoints\/","url_meta":{"origin":57485,"position":2},"title":"How Python Info-Stealers Are Targeting macOS Endpoints","author":"CPI Staff","date":"February 4, 2026","format":false,"excerpt":"Python-based info-stealers are increasingly hitting macOS via fake installers, copy-paste \u201cfixes,\u201d and stealthy packaging. Learn how they work, what they steal, and how to harden Macs in business environments.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/02\/post-6.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/02\/post-6.png 1x, \/wp-content\/uploads\/2026\/02\/post-6.png 1.5x, \/wp-content\/uploads\/2026\/02\/post-6.png 2x, \/wp-content\/uploads\/2026\/02\/post-6.png 3x, \/wp-content\/uploads\/2026\/02\/post-6.png 4x"},"classes":[]},{"id":56909,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2026\/01\/29\/intune-device-type-restriction-policies-explained\/","url_meta":{"origin":57485,"position":3},"title":"Intune Device Type Restriction Policies Explained","author":"CPI Staff","date":"January 29, 2026","format":false,"excerpt":"Learn what Intune device type restriction policies are, how they work, and how to configure them to reduce risk while keeping onboarding smooth for users.","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2026\/01\/post-10.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2026\/01\/post-10.png 1x, \/wp-content\/uploads\/2026\/01\/post-10.png 1.5x, \/wp-content\/uploads\/2026\/01\/post-10.png 2x, \/wp-content\/uploads\/2026\/01\/post-10.png 3x, \/wp-content\/uploads\/2026\/01\/post-10.png 4x"},"classes":[]},{"id":53111,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2025\/02\/19\/add-language-keyboards-to-windows-machines-with-intune\/","url_meta":{"origin":57485,"position":4},"title":"Add Language Keyboards to Windows Machines with Intune","author":"CPI Staff","date":"February 19, 2025","format":false,"excerpt":"In this Microsoft Intune blog post, we will demonstrate the process of adding an additional language keyboard to a Windows machine using Microsoft Intune. Estimated reading time: 3 minutes Microsoft Intune is a cloud-based service that provides comprehensive management of devices, applications, and security for organizations. As part of the\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp 1x, \/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp 1.5x, \/wp-content\/uploads\/2024\/07\/Deploy-Azure-OpenAI-GPT-4o-Resource-and-Model-using-Bicep.webp 2x"},"classes":[]},{"id":53625,"url":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/2025\/08\/16\/manage-windows-11-byod-devices-with-microsoft-intune\/","url_meta":{"origin":57485,"position":5},"title":"Manage Windows 11 BYOD Devices with Microsoft Intune","author":"CPI Staff","date":"August 16, 2025","format":false,"excerpt":"This post \"Manage Windows 11 BYOD Devices with Microsoft Intune\" explores what Intune can do for Windows 11 BYOD, its benefits and disadvantages, and the steps to implement and onboard personal Windows 11 devices. In the modern workplace, flexibility is no longer a perk\u2014it\u2019s an expectation. Many organisations have embraced\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/category\/blog\/"},"img":{"alt_text":"","src":"\/wp-content\/uploads\/2025\/08\/manage-windows-11-byod-devices-with-microsoft-intune-1.png","width":350,"height":200,"srcset":"\/wp-content\/uploads\/2025\/08\/manage-windows-11-byod-devices-with-microsoft-intune-1.png 1x, \/wp-content\/uploads\/2025\/08\/manage-windows-11-byod-devices-with-microsoft-intune-1.png 1.5x, \/wp-content\/uploads\/2025\/08\/manage-windows-11-byod-devices-with-microsoft-intune-1.png 2x, \/wp-content\/uploads\/2025\/08\/manage-windows-11-byod-devices-with-microsoft-intune-1.png 3x, \/wp-content\/uploads\/2025\/08\/manage-windows-11-byod-devices-with-microsoft-intune-1.png 4x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/posts\/57485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/comments?post=57485"}],"version-history":[{"count":1,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/posts\/57485\/revisions"}],"predecessor-version":[{"id":57486,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/posts\/57485\/revisions\/57486"}],"wp:attachment":[{"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/media?parent=57485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/categories?post=57485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudproinc.azurewebsites.net\/index.php\/wp-json\/wp\/v2\/tags?post=57485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}