{"id":14136,"date":"2018-12-20T15:33:44","date_gmt":"2018-12-20T23:33:44","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/12\/20\/news-7903\/"},"modified":"2018-12-20T15:33:44","modified_gmt":"2018-12-20T23:33:44","slug":"news-7903","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/12\/20\/news-7903\/","title":{"rendered":"A Devious Phishing Scam Targets Apple App Store Customers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c1a97c536da29336938e2c7\/master\/pass\/Apple-phishing-1071610244.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Wed, 19 Dec 2018 21:50:31 +0000<\/strong><\/p>\n<p><span class=\"lede\">Phishing scams often <\/span>come in waves. Last year it was a <a href=\"https:\/\/www.wired.com\/2017\/05\/dont-open-google-doc-unless-youre-positive-legit\/\">phony Google Docs link<\/a> and a <a href=\"https:\/\/www.wired.com\/story\/netflix-phishing-scam\/\">convincing Netflix impersonator<\/a>, both of which had plagued the internet sporadically for months, at least, before seeing big surges. This month, it&#x27;s a bogus Apple App Store email that convinces its victims to cough up all kinds of personal information.<\/p>\n<p>First <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/widespread-apple-id-phishing-attack-pretends-to-be-app-store-receipts\/\" target=\"_blank\">reported by Bleeping Computer<\/a>, the phishing campaign doesn&#x27;t contain any especially novel elements, but it executes the basics well enough that it&#x27;s easy to be fooled.<\/p>\n<p class=\"paywall\">Like so many phishing efforts, it starts with an email purporting to be something that it&#x27;s not. Specifically, it claims to be a purchase confirmation from Apple, with a PDF attached posing as a receipt. If your first thought is that opening that attachment is a no-good, terrible idea, you are correct! But maybe not for the reasons you suspect. There&#x27;s no malware in the file itself, but the somewhat convincing PDF contains several links with shortened URLs. Click on any of them, and you&#x27;re sent to a site that mimics Apple&#x27;s actual account management page, prompting you to enter your username and password.<\/p>\n<p>&quot;They&#x27;re able to bypass email filters more effectively, since there are no malicious links in the email itself.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Crane Hassold, Agari<\/p>\n<p class=\"paywall\">If you do so, a prompt tells you that your account has been locked for security reasons and offers an Unlock Account button. Click it and you&#x27;ll be prompted to input your name, address, Social Security number, payment info, answers to common security questions, even your driver&#x27;s license and passport number. In other words, everything an identity thief could possibly need to upend your life.<\/p>\n<p class=\"paywall\">In one final clever touch, after you submit your information, the faux Apple site says it will log you out for security\u2014then sends you to a legitimate Apple account management page.<\/p>\n<p class=\"paywall\">That sort of full-circle approach makes it a terribly convincing phishing effort. It even comes with an implicit narrative: If you get an email about a suspicious app purchase, you might assume your Apple account has been hacked, which in turn might motivate you to &quot;unlock&quot; it by proving your identity.<\/p>\n<p class=\"paywall\">This particular phishing effort appears to have been around for a while, but it has increased in popularity along with other attachment-based scams. &quot;The likely reason they&#x27;re becoming more common is because they&#x27;re able to bypass email filters more effectively, since there are no malicious links in the email itself and the PDF isn&#x27;t an inherently malicious document,&quot; says Crane Hassold, a threat intelligence manager at security firm Agari.<\/p>\n<p class=\"paywall\">The App Store scam is also indicative of other phishing trends, particularly in terms of how it has propagated. &quot;It&#x27;s likely a bunch of phishers using a single phishing kit that was created and distributed by a single actor,&quot; Hassold says. &quot;That&#x27;s essentially how the phishing ecosystem works. You have a relatively small number of actors who create phishing kits\u2014the collection of files needed to create a phishing page\u2014who then distribute them through social media, underground forums, or their own vendor webpages.&quot;<\/p>\n<p class=\"paywall\">As in any phishing scheme, there are a few simple ways to keep yourself safe. You can confirm the real identity of an email&#x27;s sender (in Gmail, click the downward-facing arrow next to your name). And if you need to enter any of your information on a site, for whatever reason, go there by typing the address directly rather than clicking on a link from an email or attachment. And in this specific case, look closely at your URL bar. The scammers apparently haven&#x27;t put much effort into making them appear legitimate.<\/p>\n<p class=\"paywall\">Eventually, the App Store phishing scam will give way to another one, just like the Netflix and Google Docs campaigns did. But the tricks it uses won&#x27;t. So take the lessons now and be ready use them every time you visit your inbox.<\/p>\n<p class=\"paywall\"><em>Additional reporting by Lily Hay Newman.<\/em><\/p>\n<p class=\"related-cne-video-component__dek\">Phishing scams are getting more and more sophisticated, to the point where they\u2019re fooling even security experts. Here&#39;s how to avoid them.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/apple-app-store-phishing-scam\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5c1a97c536da29336938e2c7\/master\/pass\/Apple-phishing-1071610244.jpg\"\/><\/p>\n<p><strong>Credit to Author: Brian Barrett| Date: Wed, 19 Dec 2018 21:50:31 +0000<\/strong><\/p>\n<p>Be on the lookout for emails that claim to be from the App Store.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-14136","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14136"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14136\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14136"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}