{"id":8609,"date":"2017-08-07T08:10:22","date_gmt":"2017-08-07T16:10:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/08\/07\/news-2382\/"},"modified":"2017-08-07T08:10:22","modified_gmt":"2017-08-07T16:10:22","slug":"news-2382","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/08\/07\/news-2382\/","title":{"rendered":"Apple phish: Summary report statement"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Mon, 07 Aug 2017 15:30:59 +0000<\/strong><\/p>\n<p>If the following message lands in your mailbox, you may wish to throw on your &#8220;This is highly suspicious&#8221; cap before proceeding further:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-apple-phish-mail.jpg\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19181\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-apple-phish-mail.jpg\" alt=\"fake apple phish mail\" width=\"822\" height=\"859\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-apple-phish-mail.jpg 822w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-apple-phish-mail-287x300.jpg 287w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-apple-phish-mail-574x600.jpg 574w\" sizes=\"auto, (max-width: 822px) 100vw, 822px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>The email is titled<\/p>\n<h2><em>RE: [ Summary Report ] Statement login and update account 08\/05\/2017<\/em><\/h2>\n<p>Note the old spammer trick of placing &#8220;RE:&#8221; at the start to make you think there&#8217;s some sort of correspondence taking place.<\/p>\n<p>Spoiler: there isn&#8217;t.<\/p>\n<p>The message reads as follows:<\/p>\n<blockquote>\n<p><em>Apple ID<\/em><br \/> <em> Account Information Page<\/em><\/p>\n<p><em>We need your help resolving an issue with your account. Thus, we have temporarily lock your account.<\/em><\/p>\n<p><em>We understant it may be frustating not to have full access to your account.<\/em><\/p>\n<p><em>We want to work with you to get your account back to normal as quickly as possible.<\/em><\/p>\n<p><em>How can you help?<\/em><\/p>\n<p><em>It&#8217;s usually quite straight forward to take care of these things. Most of time, we just need some more information about your account.<\/em><\/p>\n<p><em>Please complete your account informations by clicking in the link below.<\/em><\/p>\n<p><em>Confirm My Account<\/em><br \/> <em> We will permanently lock your account if we don&#8217;t receive your verification within 24 hours.<\/em><\/p>\n<p><em>Regards,<\/em><\/p>\n<p><em>Apple Support<\/em><\/p>\n<\/blockquote>\n<p>The URL used is a Goo(dot)gl shortener (now deactivated), which was bouncing users to the final destination below located at<\/p>\n<p>online-appleidsupport-accountimportant(dot)net\/Login(dot)php?<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/apple-account-phish.jpg\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-19170\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/apple-account-phish-300x263.jpg\" alt=\"apple account phish\" width=\"300\" height=\"263\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/apple-account-phish-300x263.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/apple-account-phish-600x526.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/apple-account-phish.jpg 802w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Entering an Apple ID and password results in the following (fake) message that the account has been locked:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/apple-phish-locked-screen.jpg\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-19171\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/apple-phish-locked-screen-300x172.jpg\" alt=\"\" width=\"300\" height=\"172\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/apple-phish-locked-screen-300x172.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/apple-phish-locked-screen.jpg 516w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<blockquote>\n<p><em>We&#8217;ve noticed significant changes in your account activity. For your protection, we&#8217;ve disable [SIC] your account.<\/em><\/p>\n<p><em>Unlock account<\/em><\/p>\n<\/blockquote>\n<p>The next page asks for a lot of personal information, including: name, address, DOB, phone number, full card information, security question information, and even <a href=\"https:\/\/www.paypal.com\/uk\/webapps\/mpp\/3dsecure-faqs\" target=\"_blank\" rel=\"noopener\">3D secure<\/a> details.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-verification-1.jpg\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-19173\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-verification-1-243x300.jpg\" alt=\"fake verification 1\" width=\"243\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-verification-1-243x300.jpg 243w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-verification-1-485x600.jpg 485w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-verification-1.jpg 784w\" sizes=\"auto, (max-width: 243px) 100vw, 243px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-verification-request-2.jpg\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-19174\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-verification-request-2-274x300.jpg\" alt=\"fake verification request 2\" width=\"274\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-verification-request-2-274x300.jpg 274w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-verification-request-2-548x600.jpg 548w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/fake-verification-request-2.jpg 789w\" sizes=\"auto, (max-width: 274px) 100vw, 274px\" \/><\/a><\/p>\n<p>This is not something you want to hand your details over to. This site joins the ranks of phishing pages making use of HTTPs to appear more authentic &#8211; here&#8217;s the real Apple sign in page:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/the-real-apple-page.jpg\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-19175\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/the-real-apple-page-300x263.jpg\" alt=\"the real apple page\" width=\"300\" height=\"263\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/the-real-apple-page-300x263.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/the-real-apple-page.jpg 339w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>You&#8217;ll notice it mentions the company name. This is called an <a href=\"https:\/\/superuser.com\/questions\/565422\/why-do-some-websites-show-the-company-name-next-to-the-url\" target=\"_blank\" rel=\"noopener\">Extended Validation certificate<\/a>. The one being used on the phish page claims to be from a service offering free certs to those possessing a web domain.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/not-apple.jpg\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-19176\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/not-apple.jpg\" alt=\"not apple\" width=\"561\" height=\"137\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/not-apple.jpg 561w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/08\/not-apple-300x73.jpg 300w\" sizes=\"auto, (max-width: 561px) 100vw, 561px\" \/><\/a><\/p>\n<p>A good example of why you shouldn&#8217;t just believe the site in front of you is legit, purely because there&#8217;s HTTPs going on in the background. Emails directing you to pages asking for payment info via embedded links should set off all the warning alarms &#8211; and this particular email and website combo should be forever banished to your &#8220;ignore forever&#8221; folder.<\/p>\n<p>Christopher Boyd<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/08\/apple-phish-summary-report-statement\/\">Apple phish: Summary report statement<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/08\/apple-phish-summary-report-statement\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Mon, 07 Aug 2017 15:30:59 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/08\/apple-phish-summary-report-statement\/' title='Apple phish: Summary report statement'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/04\/apple-mac-macbook-feature.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We take a look at an Apple ID phish currently in circulation, and examine some of the tell-tale signs you may have this lurking in your mailbox.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple\/\" rel=\"tag\">Apple<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phish\/\" rel=\"tag\">phish<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/08\/apple-phish-summary-report-statement\/' title='Apple phish: Summary report statement'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/08\/apple-phish-summary-report-statement\/\">Apple phish: Summary report statement<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2211,4503,10511,3924,10510],"class_list":["post-8609","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apple","tag-cybercrime","tag-phish","tag-phishing","tag-social-engineering"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8609"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8609\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8609"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}