Phishing posing as Apple alerts: watch out for support calls

Published 5 min de lectura 84 reading

A phishing campaign was recently detected that takes advantage of Apple's legitimate account change notifications to insert a decoy: messages that alert to a fraudulent purchase of an iPhone and encourage the victim to call a "support" number. What distinguishes this deception is that the emails are sent from Apple's own infrastructure and exceed the usual verifications of authenticity, which dramatically increases their appearance of legitimacy.

According to the investigation published by BleepingComputer, attackers create an Apple ID and use the visible fields of the profile - the name and surname - to introduce the text of the fraud. Then they modify the profile sending information, which triggers Apple's standard notification of account changes. As that alert incorporates the data from the first and second name provided by the attacker, the malicious message is embedded in a real mail sent from Apple servers.

Phishing posing as Apple alerts: watch out for support calls
Image generated with IA.

From the technical point of view, this is particularly worrying: the mail comes from Apple-associated addresses and passes the authenticity checks of email such as SPF, DKIM and DMARC. In practice, that means that many spam filters and automatic detection systems do not mark the message as a suspect, because the headers show that the delivery was made by authorized infrastructure. It is a maneuver that exploits a legitimate feature of the service to filter threats under the appearance of safety.

The ultimate objective of the fraud is to induce the recipient to call the number included in the mail. Once in the call, the scammers act as "support" and seek the victim to install remote access tools, deliver credentials or financial data, or authorize transfers. These "callback phishing" schemes are not new, but their combination with legitimate messages sent by trusted providers increases risk and effectiveness. In previous campaigns, the remote access obtained in this way has been used to empty bank accounts, deploy malware or steal sensitive information.

There is a history that shows that the attackers do not fit in with a single track: in the past, iCloud Calendar invitations have been exploited to distribute false notifications and now the same pattern applied to profile alerts is observed. You can find more context on how legitimate platform functions have been abused to send spam and scams in specialized reports such as Krebs on Security and the very follow-up of BleepingComputer.

What should a user do that receives such an email? The first thing is to stay calm and distrust any message that calls for urgent action by phone or includes unsolicited numbers. Do not call the number in the mail or click links inside the message. Instead you should access your Apple account from a browser by writing the official address (or using the Settings app on your device) and reviewing the activity and shipping information from there. Change the password, review the linked devices and make sure that two-step verification or authentication of two factors are active are essential measures to reduce damage.

In addition, it is important to report the incident to Apple through its official channels and to keep the original mail in case it is necessary to present it as evidence. Apple offers recommendations on how to identify fraudulent emails in its support center; follow these guidelines and use only official contact routes avoids falling into traps. You can see the Apple guidelines on your help page about suspicious emails at https: / / support.apple.com / en-us / HT204759.

Phishing posing as Apple alerts: watch out for support calls
Image generated with IA.

It is also worth recalling why SPF, DKIM and DMARC controls, although very useful, are not an absolute guarantee. These technologies help to verify that a mail comes from servers authorized by a domain, but cannot prevent legitimate users of that domain, or accounts created within the platform, from including malicious text in visible fields. To understand how these authentication layers work and what their limits are, it is useful to review reliable technical documentation, such as Google's on mail-supplanting protection (SPF / DKIM / DMARC) in https: / / support.google.com / a / ansher / 33786.

Finally, if someone has followed the instructions of the scam - has installed remote software, shared passwords or bank data - you must cut the communication, disconnect the network device, change the passwords from another secure computer and contact your bank to block affected operations and accounts. It is also recommended to submit a complaint to the consumer authorities; in the United States, for example, the FTC provides resources and recommendations on phone scams.

This case is a reminder that the attackers continue to refine their methods and that the legitimate functionalities of the platforms can be twisted against them. The best defense is caution: to check by own means the activity of the account, not to rely blindly on the urgency of the message and always use the official channels for any clarification. While suppliers implement additional controls, the combination of critical user sense and basic security practices remains the most effective barrier against these scams.

Coverage

Related

More news on the same subject.