As
@mmkerc pointed out, generally hackers will invest their effort on enterprise where lots of tired, frustrated, anxious people process lots of large transactions, or where the services are critical to society. Like government, hospitals and universities. But a certain style of hacking focuses on low-hanging fruit, easy picking of many small takes. Yet other hacks are simply exploratory or simply for disruption to brag about in seedy netrunner bars.
With respect to TARGETED attacks - e.g., spear-phishing and whaling - certain signals of wealth, or wealthy connections are out there to harvest by exfiltration or personal data sold by aggregators, or sold by businesses we trust. And, as individuals go, Mac users might be considered a viable demographic, because Mac People spend more on gear, and don't believe there is malware for Macs

(present company excepted, I guess).
Signals of "maliciously harvestable wealth" are not necessarily overt, or individually conclusive; however, taken together they could build a certain profile. Such signals might include posting on Apple-oriented forums, being of retirement age, association with securities brokerages, queries about crypto-coin/wallets, dozens of other bad habits such as yammering on about Porsches and horses 😳
In time, probably not much time, AI filtering and targeting will be able to suss out targets among those who keep presence on the internet to a barest minimum... and then target them with custom one-off trojans and worms. It's too late to fuss or resist - eventually the only plan is a
recovery plan, because once quantum cutting gets out of the lab, you WILL get popped like a packet of ketchup. Or a grape. Or a watermelon if you remember Gallagher at all... F, I'm old...