A phishing campaign was recently detected that takes advantage of Apple's legitimate account change notifications to insert a decoy: messages that alert to a fraudulent purchase of an iPhone and encourage the victim to call a "support" number. What distinguishes this deception is that the emails are sent from Apple's own infrastructure and exceed the usual verifications of authenticity, which dramatically increases their appearance of legitimacy.
According to the investigation published by BleepingComputer, attackers create an Apple ID and use the visible fields of the profile - the name and surname - to introduce the text of the fraud. Then they modify the profile sending information, which triggers Apple's standard notification of account changes. As that alert incorporates the data from the first and second name provided by the attacker, the malicious message is embedded in a real mail sent from Apple servers.

From the technical point of view, this is particularly worrying: the mail comes from Apple-associated addresses and passes the authenticity checks of email such as SPF, DKIM and DMARC. In practice, that means that many spam filters and automatic detection systems do not mark the message as a suspect, because the headers show that the delivery was made by authorized infrastructure. It is a maneuver that exploits a legitimate feature of the service to filter threats under the appearance of safety.
The ultimate objective of the fraud is to induce the recipient to call the number included in the mail. Once in the call, the scammers act as "support" and seek the victim to install remote access tools, deliver credentials or financial data, or authorize transfers. These "callback phishing" schemes are not new, but their combination with legitimate messages sent by trusted providers increases risk and effectiveness. In previous campaigns, the remote access obtained in this way has been used to empty bank accounts, deploy malware or steal sensitive information.
There is a history that shows that the attackers do not fit in with a single track: in the past, iCloud Calendar invitations have been exploited to distribute false notifications and now the same pattern applied to profile alerts is observed. You can find more context on how legitimate platform functions have been abused to send spam and scams in specialized reports such as Krebs on Security and the very follow-up of BleepingComputer.
What should a user do that receives such an email? The first thing is to stay calm and distrust any message that calls for urgent action by phone or includes unsolicited numbers. Do not call the number in the mail or click links inside the message. Instead you should access your Apple account from a browser by writing the official address (or using the Settings app on your device) and reviewing the activity and shipping information from there. Change the password, review the linked devices and make sure that two-step verification or authentication of two factors are active are essential measures to reduce damage.
In addition, it is important to report the incident to Apple through its official channels and to keep the original mail in case it is necessary to present it as evidence. Apple offers recommendations on how to identify fraudulent emails in its support center; follow these guidelines and use only official contact routes avoids falling into traps. You can see the Apple guidelines on your help page about suspicious emails at https: / / support.apple.com / en-us / HT204759.

It is also worth recalling why SPF, DKIM and DMARC controls, although very useful, are not an absolute guarantee. These technologies help to verify that a mail comes from servers authorized by a domain, but cannot prevent legitimate users of that domain, or accounts created within the platform, from including malicious text in visible fields. To understand how these authentication layers work and what their limits are, it is useful to review reliable technical documentation, such as Google's on mail-supplanting protection (SPF / DKIM / DMARC) in https: / / support.google.com / a / ansher / 33786.
Finally, if someone has followed the instructions of the scam - has installed remote software, shared passwords or bank data - you must cut the communication, disconnect the network device, change the passwords from another secure computer and contact your bank to block affected operations and accounts. It is also recommended to submit a complaint to the consumer authorities; in the United States, for example, the FTC provides resources and recommendations on phone scams.
This case is a reminder that the attackers continue to refine their methods and that the legitimate functionalities of the platforms can be twisted against them. The best defense is caution: to check by own means the activity of the account, not to rely blindly on the urgency of the message and always use the official channels for any clarification. While suppliers implement additional controls, the combination of critical user sense and basic security practices remains the most effective barrier against these scams.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...