Connect with us

Hi, what are you looking for?

HEADLINES

Cybercriminals using fake sites to steal Apple IDs on the rise

Cybercriminals are using fake Apple sites to try and trick users into submitting their Apple ID credentials, which would enable the criminals to steal the users’s account login and access the victim’s personal data, information and credit card numbers stored on their iCloud and iTunes accounts, according to a phishing report published by Kaspersky Lab.

KL_mac_titleA rising number of cybercriminals are using fake Apple sites to try and trick users into submitting their Apple ID credentials, which would enable the criminals to steal the users’s account login and access the victim’s personal data, information and credit card numbers stored on their iCloud and iTunes accounts, according to a phishing report published by Kaspersky Lab.

From January 2012 through May 2013 Kaspersky Lab’s cloud-based Kaspersky Security Network (KSN) detected an average of 200,000 attempts per day of users trying to access the phishing sites, which were triggered each time a user running Kaspersky Lab’s products was directed to one of the fraudulent sites.

The increase in average detections is a marked increase compared to 2011, which averaged only 1000 detections per day.

Kaspersky Lab’s web antivirus module successfully detected and prevented its users from accessing the sites; however, the increase in detections shows how these scams are becoming more commonly used by cybercriminals for phishing campaigns.

Kaspersky Lab’s experts analyzed the cybercriminals’ behavior and patterns on a daily and monthly basis, noticing that fluctuations and increases in phishing attempts often coincided with large events from Apple.

Advertisement. Scroll to continue reading.

For example, on December 6, 2012, immediately following the opening of iTunes stores in India, Turkey, Russia, South Africa and an additional 52 countries, Kaspersky Lab detected an all-time record of more than 900,000 phishing attempts directing to fake Apple sites in a single day.

Phishing emails posing as Apple

The main distribution method used by cybercriminals to direct users to the fraudulent Apple sites are predominantly phishing emails posing as Apple Support with fake alias names in the “Sender” field, such as services@apple.com.

The messages would typically request users to verify their account by clicking on a link and entering their Apple ID information.

These emails are deceptively clever and professionally designed in order to make them appear authentic, including the use of Apple’s logo and presenting the message with similar formatting, coloring and style that Apple uses.

Advertisement. Scroll to continue reading.

Another variation of these phishing emails are designed to steal Apple customers’ credit card information. This is done by sending users an email requesting that they verify or update the credit card credentials attached to their Apple IDs, which can be done by clicking on a link in the message.

The link directs the user to a phishing site that imitates how Apple requests credit card information from their customers to fool users into inputting their credit card information and other personal information.

Guidance to users: Identifying phishing websites and emails

One way to distinguish between real websites and counterfeit ones created for phishing purposes is to look at the address bar of the website.

While most counterfeit sites have the word “apple.com” as part of their address (URL), the address would not be verified by Apple and would include additional text in the URL.

Advertisement. Scroll to continue reading.

However, identifying phishing sites become harder when users can’t see the full URL address, which is typically the case when iOS users are running Safari on their iPhone or iPad devices.

When users click on links from email messages on iOS devices the complete URL address is hidden from them when the page is downloaded and opened through Safari.

How Apple users can protect themselves against phishing scams

Users should verify email address aliases from Apple by checking the original sender address first. On a computer this can be done by mousing over the sender address field, which reveals the sender alias’ true email address.

When using a mobile device, users should touch the email alias from the sender, which expands the alias to show the full address of the sender.

Advertisement. Scroll to continue reading.

To guard against fraud attempts, Apple also provides a two-step authentication process for Apple IDs. This process involves sending a four-digit code to one or more previously selected devices belonging to the user.

This serves as an additional verification and prevents undesired changes being made on the “my Apple ID” site or, for example, third parties making unauthorized purchases using your Apple ID.

Unfortunately, this does not yet prevent cybercriminals from using stolen credit card data. Users should not follow links in questionable emails to access websites. Instead, they should manually enter website addresses into browser windows.

Users who still want to use such links should carefully check their content and the address of the website they link to.

In addition, Mac users should use a security software package like Kaspersky Security for Mac as standard.

Advertisement. Scroll to continue reading.

This will protect Mac users in real-time against viruses, trojans, spyware, phishing attempts and harmful websites, as well as preventing Macs from distributing Windows malware to friends and colleagues.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Acting on reports about a suspicious message urging customers to click a malicious link to redeem ‘Smart points’, the telco quickly sprang into action...

HEADLINES

Likening the Converge network to a digital fortress, CISO Andrew T.  Malijan said that its battlements were strengthened in 2024 as it blocked a...

HEADLINES

ThinkShield Firmware Assurance is one of the only computer OEM solutions to enable deep visibility and protection below the operating system (OS) by embracing Zero...

HEADLINES

Kaspersky experts have uncovered a series of scams related to the growing demand, ranging from impersonating trusted brands to creating entirely fraudulent storefronts.

HEADLINES

Trend's 2025 predictions report warns of the potential for malicious "digital twins," where breached/leaked personal information (PII) is used to train an LLM to...

HEADLINES

The findings show that platform security – securing the hardware and firmware of PCs, laptops and printers – is often overlooked, weakening cybersecurity posture...

HEADLINES

In rigorous evaluations conducted by prestigious cybersecurity testing organizations, Kaspersky Plus (starting in Q4 2024, Kaspersky Premium), Kaspersky Endpoint Security for Business (KESB), and...

HEADLINES

"Given the Philippines' high exposure to cyber threats, it's important for both individuals and businesses to stay vigilant," said Adrian Hia, Managing Director for...

Advertisement