【2003 Archives】
Some Apple users003 Archivesreportedly being targeted by a sophisticated attack, requesting them to hand over their Apple ID credentials over and over again.
According to KrebsonSecurity, the attack starts with unsuspecting Apple device owners getting dozens of system-level messages, prompting them to reset their Apple ID password. If that fails, a person pretending to be an Apple employee will call the victim and try to convince them into handing over their password.
SEE ALSO: Apple confirms dates for WWDC 2024This is exactly what happened to entrepreneur Parth Patel, who described their experience on Twitter/X. First, all of Patel's Apple devices, including their iPhone, Watch, and MacBook, started displaying the "Reset Password" notifications. After Patel clicked "Don't Allow" to more than one hundred requests, the fake Apple Support called, spoofing the caller ID of Apple's official Apple Support line. The fraudster Apple employee actually knew a lot of Patel's real data, including email, address, and phone number, but they got their name wrong, which had confirmed Patel's suspicions that they were under attack.
You May Also Like
This Tweet is currently unavailable. It might be loading or has been removed.
While the attack was ultimately unsuccessful in this example, it's easy to imagine it working. The victim might accidentally allow the password reset (mistakes are easy to happen when you have to click on something hundreds of times), or they could fall for the fairly convincing, fake Apple Support call.
Patel's example isn't isolated, either; KrebsonSecurity has details on a very similar attack that happened to a crypto hedge fund owner identified by his first name, Chris, as well as a security researcher identified as Ken. In Chris' example, the attack persisted for several days, and also ended with a fake Apple Support call.
How did the attackers know all the data needed to perform the attack, and how did they manage to send system-level alerts to the victims' phones? According to KrebsonSecurity, the hackers likely had to get a hold of the victim's email address and phone number, associated with their Apple ID. Then they used an Apple ID password reset form, that requires an email or phone number, alongside a CAPTCHA, to send the system-level, password reset prompts. They also likely used a website called PeopleDataLabs to get information on both the victim and Apple employees they impersonated.
But there could also be a bug in Apple's systems, which should in theory be designed not to allow someone to abuse the password reset form and send dozens of requests in a short period of time (Apple did not respond to KrebsonSecurity's request for comment).
Related Stories
- I used the Apple Vision Pro on a flight to Costa Rica — and it was chaotic
- Apple confirms dates for WWDC 2024
- Apple, Google, and Meta are being investigated by the EU under new Big Tech regulation
- Apple might finally let you freely customize Home Screen icons on iPhone
- Vulnerability found in Apple's Silicon M-series chips – and it can't be patched
It appears that there's no easy or foolproof way to protect oneself from such an attack at this time, save from changing one's Apple ID credentials and tying them to a new number and email. It's hard to tell how widespread this attack is, but Apple users should be vigilant and triple-check the authenticity of any password reset request, even if it appears to come from Apple itself.
For on spammers and scammers, check out Mashable's series Scammed, where we help you navigate a connected world that’s out for your money, your information, or just your attention.
Topics Apple Cybersecurity
Search
Categories
Latest Posts
Fighting Words
2025-06-26 02:12Spotify Wrapped 2024 is here: How to get yours
2025-06-26 01:53How to evaluate nonprofits, philanthropy, and your own donations
2025-06-26 01:06Spotify wrapped: 13 best websites to analyze your Spotify data
2025-06-26 00:38Going Deeper Underground
2025-06-26 00:17Popular Posts
The Palace and the Storm
2025-06-26 01:35The best Cyber Monday Apple deals at Amazon
2025-06-26 01:06Tinder Year in Swipe: Dating predictions for 2025
2025-06-26 00:05The Crown Prince
2025-06-26 00:01Featured Posts
Who’s Afraid of the “Petextrian”?
2025-06-26 00:55Best TV deal: Save $600 on the 65
2025-06-26 00:29Biden administration takes last minute stand against data brokers
2025-06-25 23:53Catholic Sisters Storm Capitol Hill
2025-06-25 23:41Popular Articles
Not a Revolution
2025-06-26 02:09Wordle today: The answer and hints for December 3
2025-06-26 00:16Not a Revolution
2025-06-25 23:51Newsletter
Subscribe to our newsletter for the latest updates.
Comments (5779)
Unique Information Network
Breaking up the Boys’ Club
2025-06-26 02:08Flying Information Network
The 'Wicked' Shark FlexStyle is still 25% off post
2025-06-26 01:56Inspiration Information Network
Max's password sharing crackdown starts next week
2025-06-26 00:27Interesting Information Network
Best TV deal: Save $600 on the 65
2025-06-26 00:09Boundary Information Network
Stormbound
2025-06-25 23:28