Connect with us

Hi, what are you looking for?

HEADLINES

Kaspersky detects intensified scamming activities amid launch of iPhone 12

Having analyzed the names of these resources, Kaspersky’s experts now know that some of them are offering to find lost phones, while others offer help in restoring access to users’ accounts. There are also phishing sites that mimic Apple’s support services.

During the first nine months of 2020, Kaspersky has seen that scammers are consistently interested in Apple users and their accounts.

For instance, every month, the company’s researchers have found about 100 suspicious domains around the world mentioning “Apple” as a company. Most of these websites require users to enter their Apple ID and password. The number of such resources increased rapidly in September and, by the end of the month, there were already 1,950 domains.

Having analyzed the names of these resources, Kaspersky’s experts now know that some of them are offering to find lost phones, while others offer help in restoring access to users’ accounts. There are also phishing sites that mimic Apple’s support services. It is most likely that these resources were created with the aim of stealing users’ accounts. However, they did not work properly and were only a ‘stub’ piece of software. Scammers like to use these pages as a precaution so when one resource is blocked, they can activate another.

Kaspersky’s security expert Tatyana Sidorina is calling on Apple users to be more careful and says: “This resurgence of scammers’ interest in Apple services shows that they would happily benefit from anything that attracts users’ attention. The launch of the new iPhone might be a perfect opportunity for scammers to spread malicious features.”

Advertisement. Scroll to continue reading.

In order to avoid falling victim to a scam, Kaspersky also advises users:

  • To be skeptical about any news or extremely generous offers and promotions
  • To verify that messages are coming from reliable sources
  • Not to follow links from suspicious emails or messages in instant messengers and social networks
  • To check the authenticity of websites they visit
  • To install a security solution with up-to-date databases that include knowledge of the latest phishing and spam resources

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Smart and its value brand TNT do not send text messages with clickable links. If you receive one—even if it looks like it’s from...

HEADLINES

“Power Mac Center joins the cultural celebration of Easter as a season of joy and traditions for the family and community. We recognize how...

SOFTWARE

With the new Spatial Gallery app, users have access to a curated collection of spatial content spanning art, culture, nature, sports, and more. visionOS...

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

Advertisement