New cyberattack against iPhone and Apple ID. We tell you how to protect yourself


Attention iPhone owners: A serious cyberthreat is targeting Apple IDs and it’s more important than ever to be vigilant. Security experts at Symantec have uncovered a sophisticated SMS phishing campaign designed to trick you into giving up your valuable Apple ID credentials.

RECEIVE SECURITY ALERTS, EXPERT TIPS: SUBSCRIBE TO KURT'S NEWSLETTER – THE CYBERGUY REPORT HERE

The mechanics of the attack

Here's how the scam works: Hackers send text messages that appear to be from Apple. These messages urgently request that you click on a link to get an important iCloud update or verification. Symantec Research These links lead to cleverly designed fake websites that ask for your Apple ID and password. To make the site look legitimate, the attackers have even included a CAPTCHA.

Once you complete the CAPTCHA, you'll be taken to an outdated-looking iCloud login page, where you'll be asked to enter your credentials. This information is valuable to cybercriminals, as it gives them access to your personal and financial data and control over your devices.

Below is an email version of this same scam that should be avoided. Note the strange return email address originating from a non-Apple account, riddled with dashes and strange characters.

The email scam may claim that a user's iCloud storage is full. (Kurt “CyberGuy” Knutsson)

Apple's response and protective measures

Apple is aware of these tactics and has guidelines to help keep you protected. First, turn on two-factor authentication on your Apple ID. This adds an extra layer of security by requiring a password and a six-digit verification code every time you sign in from a new device.

Remember that Apple will never ask you to turn off security features like two-factor authentication or protection against stolen devices. Scammers may claim this is necessary to solve a problem, but it's a trap designed to lower your defenses.

Warning for Apple iPhone owners who surpass 1 billion

An iPhone scam uses text messages. (Kurt “CyberGuy” Knutsson)

How to detect phishing attempts

Phishing scams can be tricky, but there are ways to spot them. Look closely at the URLs in suspicious messages. While the message may look legitimate, the web address often doesn't match Apple's official website. Also, be wary of any text that deviates from Apple's usual communication style.

Symantec highlighted a specific phishing message as part of its July 2 warning. The fraudulent SMS read: “Important Apple iCloud request: Please visit the login site.”[.]authentication connection[.]info/iCloud to continue using their services.” Strange characters and unknown domains are clear indicators of a scam.

New cyberattack against iPhone and Apple ID. We tell you how to protect yourself

iPhone users must enable two-factor authentication on their Apple ID. (Kurt “CyberGuy” Knutsson)

Broader scam tactics and how to avoid them

These phishing attempts aren't just targeting Apple users. People have reported receiving messages similar to those from companies like Netflix and Amazon, informing them of problems with their accounts or expired credit cards. These messages also tell them to click on a link and enter their personal information.

The Federal Trade Commission warns that legitimate companies will never ask for sensitive information via text message. If you receive a message like this, contact the company directly using a verified number or website, not the information provided in the text message.

7 SIGNS YOU'VE BEEN HACKED

How to protect yourself from Apple text and email scams

1) Always use strong antivirus protection on all your devices

This is perhaps one of the best investments you can make to protect yourself from phishing scams. Having active antivirus software on your devices will allow you to ensure that you do not click on any malicious links or download any files that could introduce malware to your device and potentially steal your private information. Read my review of my top antivirus picks here.

2) Don't take the bait

Scammers often use alarming language to prompt immediate action. Phrases like “act now” or “important” are red flags. Stay calm and be skeptical of any unsolicited messages.

3) Enable two-factor authentication on your Apple devices

Implement multifactor authentication on your Apple ID can greatly improve your security. Always verify the source of any messages claiming to be from Apple. If you're unsure, manually log in to your account through Apple's official website or your iPhone's settings instead of clicking any links.

4) Keep your software up to date

Regularly update Review your operating system, web browsers, and antivirus software to make sure they're equipped to detect and prevent the latest threats. You can periodically check for software updates in your device's Settings app, and you can go to the App Store or Google Play Store (depending on the device you have) to check for updates to individual apps. Follow these steps here.

2 ESSENTIAL STEPS TO PROTECT YOUR MAC FROM HACKERS

What should you do if you clicked on a link and installed malware on your device?

If you have been the victim of a cyber attack, it is not too late. There are several ways to protect yourself from hackers, even when they have access to your information.

1) Scan your device for malware

First, you'll want to scan your computer with a trusted and legitimate antivirus program. Check out my expert review of the best antivirus protection for your Windows, Mac, Android and iOS devices.

2) Change your passwords immediately

If you have inadvertently provided your information to hackers or malicious actors, they could have access to your social media or bank accounts. To prevent this, you should change the passwords for all your important accounts as soon as possible. However, you should not do this on your infected device, because the hacker could see your new passwords. Instead, you should use OTHER DEVICEsuch as your laptop or desktop computer, to change your passwords. Make sure you use strong, unique passwords that are difficult to guess or crack. You can also use a password manager to generate and store your passwords securely.

3) Monitor your accounts and transactions

You should review your online accounts and transactions regularly for suspicious or unauthorized activity. If you notice anything unusual, report it to your service provider or the authorities as soon as possible. You should also review your credit reports and scores for signs of fraud. Identity theft or fraud.

4) Use identity theft protection

Phishing emails target your personal information. Hackers can use this information to create fake accounts in your name, access your existing accounts, and impersonate you online. This can cause serious damage to your identity and credit rating.

To prevent this, you should use identity theft protection services. These services can track your personal information, such as your home title, Social Security number, phone number, and email address, and notify you if they detect any suspicious activity. They can also help you freeze your bank and credit card accounts to prevent hackers from using them.

One of the best parts of using some services is that they may include identity theft insurance. Up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a A US-based case manager helps you recover any losses. Read more of my review of the best identity theft protection services here.

5) Contact your bank and credit card companies

If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should contact your bank and credit card companies and inform them of the situation. They can help you freeze or cancel your cards, dispute fraudulent charges, and issue new cards to you.

6) Alert your contacts

If hackers have gained access to your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.

7) Restore your device to factory settings

If you want to make sure that your device is completely free of malware or spyware, you can restore it to factory settings. This will erase all of your data and settings and reinstall the original version. back your important data before doing this and restore it only from a trusted source.

HOW TO DELETE YOUR PRIVATE DATA FROM THE INTERNET

Kurt's conclusions

As cyberattacks become increasingly sophisticated, it's critical to stay informed and cautious. Protect your Apple ID and personal information by following Apple's security guidelines and be wary of unsolicited messages. By taking these precautions, you can protect your devices and data from malicious actors.

Have you ever been a victim of a cyber scam? If so, what happened and how did you recover? Let us know by writing to us at Cyberguy.com/Contact.

For more tech tips and security alerts, subscribe to my free CyberGuy Report newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or tell us what stories you'd like us to cover..

Follow Kurt on his social channels:

Answers to CyberGuy's most frequently asked questions:

Copyright 2024 CyberGuy.com. All rights reserved.

scroll to top