Apple TestFlight was abused as a secondary malware delivery vector in the UNC4736 Drift Protocol campaign, with a fraudulent TestFlight application used to compromise developer devices as part of the multi-phase intrusion. No Apple platform vulnerability is cited; the risk is the implicit trust users place in TestFlight as a sanctioned app distribution mechanism. Organizations should audit TestFlight app installations across developer devices, restrict TestFlight usage to applications approved through a formal software inventory process, and remove any applications installed outside that process.