{"id":11473,"date":"2018-02-13T11:10:17","date_gmt":"2018-02-13T19:10:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/02\/13\/news-5244\/"},"modified":"2018-02-13T11:10:17","modified_gmt":"2018-02-13T19:10:17","slug":"news-5244","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/02\/13\/news-5244\/","title":{"rendered":"Panic attack: Apple scams apply pressure"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 13 Feb 2018 18:31:12 +0000<\/strong><\/p>\n<p>We&#8217;ve seen a number of Apple-related phishes in circulation over the last few days. While most of them already lead to deactivated phishing sites, we thought it was worth highlighting some of the tricks being used to bait people into handing over payment details at the moment.<\/p>\n<h3>Fake receipt emails<\/h3>\n<p>First up, a number of fake &#8220;receipt&#8221; emails ranging in date from February 2\u20136. While the content of some of the emails varies slightly, most of them use a subject line similar to the below:<\/p>\n<blockquote>\n<h3><em>[ New Statement ] Your receipt from Apple [ 02 February 2018 ]<\/em><\/h3>\n<\/blockquote>\n<p>In the cases we&#8217;ve seen, the mails claim to be receipts for a payment of $9.99 made out to, er, Mr. Edward Snowden. Apparently, privacy campaigns and 2 terabyte storage plans go together nicely.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fake-apple-cloud-purchase-1.jpg\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-21519\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fake-apple-cloud-purchase-1-245x300.jpg\" alt=\"fake apple cloud purchase\" width=\"245\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fake-apple-cloud-purchase-1-245x300.jpg 245w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fake-apple-cloud-purchase-1-490x600.jpg 490w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fake-apple-cloud-purchase-1.jpg 750w\" sizes=\"auto, (max-width: 245px) 100vw, 245px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>The general rule of thumb is to try and be as inconspicuous as possible, so we&#8217;re not really sure why the scammers went with one of the most well-known privacy advocates on the planet to fill in the personal information box. Not only that, but they used a randomly-grabbed address from a property website sporting nine bedrooms and four bathrooms.<\/p>\n<p>Maybe the plan is to hit the potential victim with something so utterly ludicrous, that they&#8217;ve already clicked the link before they&#8217;ve had time to think about it. For a lot of people, simply seeing a &#8220;Thanks for the order of this thing that costs you money&#8221; would be enough to have panic set in.<\/p>\n<p>The good news for potential clickers is, the site the scammers are trying to bounce through is already wise to the scam and has effectively killed the one-way street to the phish page.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fake-apple-link-is-down.jpg\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-21505\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fake-apple-link-is-down-289x300.jpg\" alt=\"That link is down\" width=\"289\" height=\"300\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fake-apple-link-is-down-289x300.jpg 289w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fake-apple-link-is-down-579x600.jpg 579w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/fake-apple-link-is-down.jpg 799w\" sizes=\"auto, (max-width: 289px) 100vw, 289px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to enlarge<\/p>\n<p>The phish link itself is also offline, so we can&#8217;t show you what may lay in wait. But we can confirm people won&#8217;t be losing money to this one anytime soon.<\/p>\n<h3>Someone else logged in<\/h3>\n<p>Elsewhere, we have a &#8220;Reminder&#8221; notification that someone else is logging in on your Apple account with an iPod in Monaco.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ipod-login.jpg\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-21506\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ipod-login-300x276.jpg\" alt=\"ipod login\" width=\"300\" height=\"276\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ipod-login-300x276.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ipod-login-600x551.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/ipod-login.jpg 863w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center\">Click to Enlarge<\/p>\n<p>The email reads as follows:<\/p>\n<blockquote>\n<h4>[Reminder] [Notification Update] Statement new log-in\u00a0your Apple account with other device<\/h4>\n<h4>F\u03bfu\u0433 \u0443\u03bfu\u0433 \u0455\u0430f\u0435t\u0443, \u0443\u03bfu\u0433 \u0391\u0440\u0440l\u0435 ID h\u0430\u0455 \u042c\u0435\u0435n l\u03bf\u0441\u03ba\u0435d \u042c\u0435\u0441\u0430u\u0455\u0435 w\u0435 f\u03bfund \u0455\u03bfm\u0435 \u0455u\u0455\u0440\u0456\u0441\u0456\u03bfu\u0455 \u0430\u0441t\u0456\u03bd\u0456t\u0443 \u03bfn \u0443\u03bfu\u0433 \u0430\u0441\u0441\u03bfunt. \u0405\u03bfm\u0435\u03bfn\u0435 \u0430\u0441\u0441\u0435\u0455\u0455\u0456ng \u0443\u03bfu\u0433 \u0430\u0441\u0441\u03bfunt \u0430nd m\u0430\u03ba\u0435 \u0455\u03bfm\u0435 \u0441h\u0430ng\u0435 \u03bfn \u0443\u03bfu\u0433 \u0430\u0441\u0441\u03bfunt \u0456nf\u03bf\u0433m\u0430t\u0456\u03bfn. This the details :<br \/> Country : Monaco<br \/> IP Address :<br \/> Date and Time : 13:09, 06 Feb 2018<br \/> OS : iPod<br \/> Browser : Safari<\/h4>\n<h4>If you did not make these action or you believe an unauthorized person has accessed your account, you should login to your account as soon as possible to verify your information.<\/h4>\n<\/blockquote>\n<p>Apart from the lazy typos (&#8220;Four your safety&#8221;) and awful sentence structure, they also make use of some Cyrillic characters in a likely attempt to bypass <a href=\"https:\/\/en.wikipedia.org\/wiki\/Naive_Bayes_spam_filtering\" target=\"_blank\" rel=\"noopener\">Beyesian filtering<\/a>. While the destination site was offline again, it&#8217;s worth noting that all of the examples tried to send potential victims to HTTPs websites, instead of the plain old HTTP landing page. All phishers now want to look as &#8220;secure&#8221; as they possibly can\u2014anything to help pull the wool over your eyes.<\/p>\n<p>Always worth repeating: Just because a website is HTTPs, does not mean it is a legitimate website. Phish pages can lurk anywhere, no matter what security the page you&#8217;re on happens to be touting.<\/p>\n<h3>Apple care scare<\/h3>\n<p>There&#8217;s also some dubious texts going around claiming to be from Apple Care:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/final-notification.jpg\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-21507\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/final-notification-300x218.jpg\" alt=\"final notification\" width=\"300\" height=\"218\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/final-notification-300x218.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/final-notification-600x436.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/02\/final-notification.jpg 1206w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>It reads as follows:<\/p>\n<blockquote>\n<h4><em>Final Notification<\/em><\/h4>\n<h4><em>Your Apple ID is due to expire today. Prevent this by confirming your Apple ID at<\/em><\/h4>\n<h4><em>appleid-revise(dot)com<\/em><\/h4>\n<h4><em>Apple Inc<\/em><\/h4>\n<\/blockquote>\n<p>As you can see, there&#8217;s a big push to apply pressure to potential victims, and everything falls somewhere between the two extremes of &#8220;Payment made, quick do something!&#8221; and &#8220;So, your account is going to be terminated.&#8221; While we&#8217;re happy to say this is another one that came to our attention already DOA, even as texts were going out, the sad truth is that for every site taken down there are many more happily accepting credit card details and personal information.<\/p>\n<h3>Fake app purchases<\/h3>\n<p>We&#8217;ve also seen some fake app purchases, and this one rather spookily has an order number attached that was actually of some relevance to the recipient.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Be aware of Apple Phishing email! (See pic) I checked my payment source, &amp; called Apple. They DO NOT have a link in the receipt emails. The order ID was a valid one from a purchase 2 months ago. (Not this purchase) <a href=\"https:\/\/twitter.com\/hashtag\/TeamEmmmmsie?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#TeamEmmmmsie<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/TUGfam?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#TUGfam<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/MGC?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#MGC<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/AppleSupport?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#AppleSupport<\/a> <a href=\"https:\/\/t.co\/SZYY2YxS0q\" target=\"_blank\" rel=\"noopener\">pic.twitter.com\/SZYY2YxS0q<\/a><\/p>\n<p>\u2014 Rick92647 [TeEm] [TugFam] [MGC] (@Rick92647) <a href=\"https:\/\/twitter.com\/Rick92647\/status\/960652803537436672?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">February 5, 2018<\/a><\/p>\n<\/blockquote>\n<p>While one hopes this is just some horrible coincidence, it could just as easily have prompted the above individual to start visiting rogue links\u2014and that&#8217;s all it really takes. Just one fragment of information from an otherwise garbled email missive could be enough to cost someone a small fortune\u2014or even worse, a very large one.<\/p>\n<p>If you&#8217;re worried about the pushy tone of a supposed Apple missive, contact them directly to check its validity, and wander over to their <a href=\"https:\/\/support.apple.com\/en-gb\/HT201303\" target=\"_blank\" rel=\"noopener\">help page<\/a> for more information on securing your Apple account. These are some of the most common scams around, and for as long as Apple IDs are tied to valuable purchases and personal information, criminals will continue target these accounts.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/panic-attack-apple-scams-apply-pressure\/\">Panic attack: Apple scams apply pressure<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/panic-attack-apple-scams-apply-pressure\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Tue, 13 Feb 2018 18:31:12 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/panic-attack-apple-scams-apply-pressure\/' title='Panic attack: Apple scams apply pressure'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/01\/apple-iphone-smartphone-desk.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We take a look at some of the many vaguely threatening\/panic-inducing attempts by Apple scams to phish potential victims. Featuring emails, texts, and&#8230;Edward Snowden?!<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/social-engineering-cybercrime\/\" rel=\"category tag\">Social engineering<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple\/\" rel=\"tag\">Apple<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple-scams\/\" rel=\"tag\">Apple Scams<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple-support\/\" rel=\"tag\">Apple Support<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ipod\/\" rel=\"tag\">ipod<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/itunes\/\" rel=\"tag\">itunes<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phish\/\" rel=\"tag\">phish<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/scam\/\" rel=\"tag\">scam<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/panic-attack-apple-scams-apply-pressure\/' title='Panic attack: Apple scams apply pressure'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/panic-attack-apple-scams-apply-pressure\/\">Panic attack: Apple scams apply pressure<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2211,17519,17520,4503,17521,17522,10511,3924,3985,10510],"class_list":["post-11473","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apple","tag-apple-scams","tag-apple-support","tag-cybercrime","tag-ipod","tag-itunes","tag-phish","tag-phishing","tag-scam","tag-social-engineering"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11473"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11473\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}