Scams are getting more sophisticated. Learn what to look for so you don't fall prey to an Apple phishing email.
It’s the end of a long day, and you open your email one last time. There, waiting at the top of your inbox, is a message from Apple asking you to confirm a purchase. The kids must have downloaded an app, you might think as you click on the link in the email to find out what they bought. Unfortunately, you may have just become the latest victim of an Apple phishing email.
What is phishing? It’s a type of scam in which fraudsters try to trick you into giving up personal information. Often, the scam arrives via an email, text message or phone call that appears to be from a legitimate company but really isn’t. If you click through using the link, you may soon find yourself googling “How to tell if my computer has been hacked” or wondering if your login credentials are on the most commonly used password list.
Even if they’re not, it’s easy to fall prey to phishing schemes, which have quickly become the most common type of internet-related crime. In 2021, the FBI’s Internet Crime Complaint Center received 323,972 complaints about phishing—a 34% increase over 2020. What’s worse, people who fell for these scams lost a total of more than $44 million. Read on to learn how to avoid online scams, then find out how to steer clear of Facebook Marketplace scams, Amazon scams and phone call scams.
What is phishing?
When hackers go phishing, they try to trick you into divulging personal information, such as passwords, bank information and Social Security numbers. They accomplish this by sending emails, texts (one of several types of texts you should immediately delete) and other types of messages that look like they’re coming from a legitimate company, like Amazon, your bank or your email provider.
These messages typically advise you of some problem with your account and ask you to click a link to remedy the situation. If you click, you may land on a website that looks like the real deal but is actually a form of spoofing. That website might ask you to enter your personal data, which bad actors then steal with ill intent. This type of scam is so common that one out of every 99 emails sent is a phishing email.
What is an Apple phishing scam?
In an Apple phishing scam, the fraudulent message appears to come from Apple, which is the second-most-impersonated brand (coming in just behind eBay). Sometimes the Apple phishing email looks like it’s from the App Store; other times, it may be associated with your Apple Pay account, your iTunes account or some other area of the Apple ecosystem.
One common type of Apple phishing email tries to get you to disclose your Apple ID and password, which you need to access Apple services like the App Store, Apple Music, iCloud, iMessage and FaceTime.
Why would someone phish for your Apple ID?
rd.com, Getty Images (2)
Your Apple ID account contains all your contact, payment and security information, which you can use to buy music, movies, apps, subscriptions and more.
If hackers discern your ID and password, they can dig even deeper, gaining private information, either for their own nefarious uses or to sell on the black market. “The bad guys get access to your iCloud email and the history of your app, music and movie purchases and rentals,” says Chris Hauk, consumer privacy champion at Pixel Privacy. They also have entree to all the documents, photos and files stored on your iCloud drive. They can even use your account to watch your movies and, in the latest scams, steal your money.
With more than 1.8 billion Apple devices currently in use, targeting Apple IDs can be a lucrative hustle for scammers.
How do Apple ID scams work?
Scammers have become very savvy and will use any method available to them to get your attention and try to phish for your information. Hauk says spoofed emails and texts are the most common methods. “They’re the easiest to pull off and don’t require any real programming skills on the part of the bad actor.”
But scammers will also target you through browser pop-up notices, phone calls and even calendar invitations. Usually, they try to entice you to click on a link or call a phone number for legitimate-sounding purposes but are actually trying to either steal, or get you to divulge, personal information. Often, scammers create a sense of urgency, says Russell Kent-Payne, director and co-founder of Certo Software, “so that their victims react quickly to the message and are then less likely to spot that it’s a fake.” They may even create a fake Apple virus warning.
What are the main Apple ID phishing scams to be aware of?
Hackers are continually inventing new scams and rehashing old ones. Some of the most common Apple ID phishing scams now include the following:
Apple support scam
rd.com, Getty Images
Running an Apple support scam is just one thing hackers can do if they have your phone number. Here’s how it works: You’ll receive a phone call—or often several calls in less than an hour—from what appears to be the real Apple support phone number. Instead, the number has been spoofed. If you answer the call, the scammer claims to be from Apple and says your Apple ID or iCloud account has been compromised. To fix things for you, they’ll say, they need your password or other sensitive information. Sometimes, rather than speaking with you directly, scammers will leave an automated voice message directing you to call a specific number for “Apple support.”
If you call the number, everything sounds legitimate, including updates telling you the anticipated hold time. When you finally connect with a human, they will ask you for compromising information. For the record, Apple will never call you to notify you of suspicious activity. In fact, Apple won’t call you for any reason—unless you request a call first. Phone scams like these are also known as vishing.
MetaMask Apple ID scam
This scam, which Kent-Payne says was discovered earlier this year, relies on the surging popularity of cryptocurrency and NFTs. In this case, scammers target MetaMask, a popular digital wallet for crypto, which is typically backed up to iCloud—a helpful security measure if your device is ever lost or stolen, Kent-Payne says.
This con usually starts once scammers know the email address associated with your Apple ID. They make multiple password reset requests, and you receive text alerts on your phone each time, sparking concern that your account may be comprised.
Next, says Kent-Payne, in a manner similar to the support scam, you receive a phone call that appears to come from Apple, warning you about suspicious activity on your account. Since this corresponds with the activity you’ve been seeing, it’s easy to believe the call is legitimate. With you on the line, the scammer requests another password reset, this time sending a six-digit verification code to your phone and then asking you for that code, all under the guise of verifying your identity.
Once they have that code, however, they are able to reset your Apple ID password. They can gain access to everything stored in iCloud, including your MetaMask wallet, and steal your cryptocurrency. One user lost $650,000 earlier this year as a result of this scam.
Apple ID order receipt
In this Apple phishing email scam, you’ll receive an email that appears to be from Apple, stating that your ID has been used to make a purchase, usually with a PDF receipt attached as “proof.” The email will either ask you to confirm the purchase or submit payment for it.
In either instance, you’ll typically see links that, if clicked, will take you to a fake Apple account management page. “It attempts to entice you to give up your Apple ID and password,” Hauk says.
Apple ID locked
This scam often works in tandem with the fake receipt scam. If you follow a spoofed email to a fake Apple page and then input your information, you may see a notification telling you that your account has been locked due to suspicious activity. It’ll then show you an “unlock” button, which requires you to divulge personally identifying information, such as your name, Social Security number, payment information and answers to common security questions.
Sometimes, this scam will arrive via an iMessage alert that states your Apple ID has been locked because your ID is about to expire. The message might ask you to complete a form to unlock your account. This, of course, gives the hackers access to sensitive info.
It’s true that Apple sometimes locks IDs if the company suspects fraudulent activity, but you can unlock your Apple ID by placing a phone call directly to Apple. It’s worth noting, however, that Apple IDs don’t expire, Kent-Payne says.
iPhone locked
If you get hit with a Find My iPhone scam, you’ve probably already fallen for at least one other Apple ID scam. If hackers have already gained access to your iCloud account, they could activate the Find My feature and place your device into “lost” mode, which remotely locks it. Then you’ll see a pop-up message on your phone saying that it will remain locked until you pay a ransom.
What are other types of Apple phishing scams?
Apple Pay suspended
In this scam, which Hauk says is becoming increasingly prevalent, people who use Apple Pay in their digital wallets may receive a text message on their phones warning that “Apple Pay has been suspended on your device.”
The message includes a link, which you can click to allegedly resolve the problem. If you tap the link, you land on a page that looks legitimate, with a message stating something like: “Apple Pay was suspended on your device. You can continue to make contactless purchases once you have reactivated your wallet.”
It’s easy to see why someone would click, but don’t! If you click through to the next page, it asks for personally identifying or financial information. Some users have had their identities stolen or their bank accounts emptied through this scam.
Apple gift card scam
Similar to the Apple support scam, the Apple gift card scam starts with a phone call. The person on the other end urgently insists that you need to make a payment of some kind—for a utility bill, taxes, hospital bill, debt collection, even bail money. They ask you to purchase an Apple Gift Card (sometimes with thousands of dollars loaded onto it) at your nearest electronics store, supermarket or convenience store and use it to pay the bill by sharing the code on the back of the card with them.
The catch: You can use Apple gift cards to purchase only goods and services from Apple—things like subscriptions to Apple Music, iCloud storage and products from Apple retail stores. If someone asks you to use it to pay for something else, it’s a sure bet they’re running a gift card scam, and the swindlers are using the number you just gave them to buy a sweet new phone or computer for themselves.
Calendar invitation
You might receive a spammy iCloud calendar invitation to a meeting or event from an unknown individual or group, often with promises for easy money, pornography or pharmaceuticals. You guessed it: If you click on a link or respond to the invitation in any way, you’re opening yourself up to phishing or, at the very least, more spam. Here’s how to stop iPhone calendar spam.
How to spot Apple ID phishing scams
RD.com, Getty Images (2)
Scammers are becoming increasingly sophisticated in the art of making emails, texts and other communications look like the real deal. “Being able to recognize an attack is key to protecting yourself against phishing,” says Kent-Payne. Here’s what to look for.
- Spoofed address. Hover on the sender’s name in your inbox to see the full email address. If the message claims to be from Apple but the address is off by a letter or two—or worse, is just a bunch of random letters and numbers—it’s probably a phishing attempt.
- Suspicious links. Check the URL of any link sent in a text or email before clicking on it. “Scammers will often try to disguise the true destination of a link by changing its display address to something simple like ‘Click here’ or ‘Sign in,'” says Kent-Payne. “This makes it much harder for the victim to know they’re being taken to a malicious website.” On iOS devices, however, you can preview the true destination, he says. On an iPhone, just tap and hold the link, and a pop-up will appear, showing you the full URL. (On a Mac, hover your cursor over a link, and you’ll see the full URL at the bottom of the browser or in a pop-up in the email. “If the message claims to be from Apple but the link URL appears to have nothing to do with Apple, that’s a pretty good sign it is a scam.”
- Vague greeting. Reputable companies will usually address you by your full name, says Kent-Payne. Scammers will use something more generic, like “dear friend.”
- Misspellings, grammar mistakes and obvious typos. Reputable companies take pains to make sure their communication is clear, accurate and precise. Someone out to scam you may send a typo-ridden email.
- A sense of urgency. Phishing scams often create a false sense of urgency or rely on emotional manipulation to get you to act quickly.
Any legitimate email related to your Apple ID account will always come from [emailprotected] In addition, unlike Apple phishing emails, messages sent from Apple will never ask you to disclose your Apple ID password, Social Security number, your mother’s maiden name, your full credit card number or your credit or debit card’s CCV security code.
“Genuine purchase receipts—from purchases in the App Store, iTunes Store, iBooks Store or Apple Music—include your current billing address, which scammers are unlikely to have,” says Apple. You can also check your purchase history from any device without clicking on links in suspicious emails.
How to protect yourself from Apple ID phishing scams
The best way to avoid becoming the victim of a phishing attack is to never click on a link or attachment within an unsolicited email or text message, Hauk says.
The same holds true for phone calls. Apple and other companies will never call you out of the blue to discuss your device’s security. Don’t accept these calls or click on hyperlinked phone numbers within messages—and never answer a call from one of the suspicious area codes often used by scammers. If you have a concern about your device, visit Apple’s official website for information on whether your device or account truly has been compromised and what to do if it has. Don’t call the Apple number in your contacts if you think you’ve been scammed; a scammer’s spoofed number can appear there, as if it’s from Apple.
In addition to ignoring unsolicited communication, Kent-Payne suggests enabling two-factor authentication for any important accounts, including your Apple ID, email, social media and banking. “This means that even if a hacker works out your password via a phishing attack, they still can’t access your account,” he says.
He also recommends using Apple’s Message Filtering. That feature separates out any texts you receive from people who are not in your contacts and sends them to the “unknown senders” tab in your Messages list. You can turn on message filtering in Settings. (Go to “Messages” and toggle “Filter Unknown Senders” to the on position.) If you use filtering in conjunction with a good security app, such as Truecaller or SpamHound, the app can alert you when you receive a phishing message, Kent-Payne says.
And be sure to adhere to the following best practices:
- Never share your Apple ID password with anyone, including someone who says they’re from Apple.
- Keep your operating system updated to the latest version.
- Keep your browsers updated. Consider using a browser like Chrome, which has built-in phishing protections.
- Use antivirus and anti-malware programs on your devices.
- Always check the URL of any website into which you’ll be entering sensitive information. It should always start with “HTTPS” (the “s” stands for “secure”).
- Don’t reuse the same password on multiple sites. That just makes it easier for hackers. A password manager can help you keep track of strong, unique passwords.
What should you do if you receive an Apple ID phishing attempt?
rd.com, Getty Images
In most cases, you can safely close and ignore the email, text or pop-up, or hang up on the caller. Whatever you do, don’t click on any links or provide any personal information to the scammer. You should, however, report the attempt to the appropriate parties.
If you receive an Apple phishing email, forward it to [emailprotected] If you receive a suspicious iMessage or calendar invite, you should see an option under the message to “Report Junk.” If the option doesn’t appear, you can still block the sender. And if you get a fake tech-support phone call, you can report it to your local police department and to the Federal Trade Commission.
And if you happen to accidentally click on a suspicious link, don’t panic. “As long as you don’t supply any information that might be requested on a linked webpage, you should be OK,” Hauk says.
Did you already enter personal information? Immediately change your Apple ID password and enable two-factor authentication. Then review all the security information in your account to make sure it’s still accurate. You’ll want to check your name, your primary Apple ID email address and any other rescue emails or phone numbers, and your security questions and answers. Also check to see where your Apple ID is being used. You can find that information by going to Settings, then clicking on your name. If you see a device you don’t recognize, you can remove it from the list.
Sources:
- Chris Hauk, consumer privacy champion at Pixel Privacy
- Russell Kent-Payne, director and co-founder of Certo Software
- FBI: “Internet Crime Report 2021”
- Clario: “Startling Phishing Statistics to Be Aware of in 2022”
- Apple: “Recognize and avoid phishing messages, phony support calls, and other scams”
- Apple: “If you think your Apple ID has been compromised”
- Apple: “About Gift Card Scams”
FAQs
Does Apple have a phishing email? ›
If you receive a suspicious email that looks like it's supposed to be from Apple, please forward it to reportphishing@apple.com.
What should you look out for when identifying a phishing email? ›- Emails with Bad Grammar and Spelling Mistakes.
- Emails with an Unfamiliar Greeting or Salutation.
- Inconsistencies in Email Addresses, Links & Domain Names.
- Suspicious Attachments.
- Emails Requesting Login Credentials, Payment Information or Sensitive Data.
- Too Good to Be True Emails.
When you create an Apple ID, you enter an email address. This email address is your Apple ID and the username that you use to sign in to Apple services like Apple Music and iCloud. It's also the contact email address for your account. Be sure to check your inbox regularly.
How does Apple tell you you've been hacked? ›If Apple detects evidence of a state-sponsored attack, the targeted user will get a Threat Notification on the top of the page when signed into appleid.apple.com. Apple will also send an email and iMessage notification to the account associated with the user's Apple ID.
Does Apple notify you if you have been hacked? ›How Apple's threat notifications work. If the company suspects that someone has hacked into an Apple device, it will notify the user in two ways. First, Apple will display a Threat Notification at the top of the page when a user visits and signs into appleid.apple.com.
What are 3 signs of a phishing email? ›- Asks for Sensitive Information.
- Uses a Different Domain.
- Contains Links that Don't Match the Domain.
- Includes Unsolicited Attachments.
- Is Not Personalized.
- Uses Poor Spelling and Grammar.
- Tries to Panic the Recipient.
Use anti-phishing protection and anti-spam software to protect yourself when malicious messages slip through to your computer. Anti-malware is included to prevent other types of threats. Similar to anti-spam software, anti-malware software is programmed by security researchers to spot even the stealthiest malware.
What are 4 indicators of a suspicious email? ›- An unfamiliar greeting.
- Grammar errors and misspelled words.
- Email addresses and domain names that don't match.
- Unusual content or request – these often involve a transfer of funds or requests for login credentials.
- Urgency – ACT NOW, IMMEDIATE ACTION REQUIRED.
A common indicator of a phishing attempt is a suspicious attachment. The bad guys often use phishing emails to send these attachments because they know many people are curious enough to open them and click on whatever links or buttons they contain. These attachments may be a Word document or zip file, for example.
How can you confirm if an email request is legitimate? ›Hover over links.
By far the easiest way to identify if an email is legitimate or not, is to simply hover your mouse arrow over suspicious links. By doing so, you will be able to tell if the email is from a recognizable domain that is linked to the actual sender name.
What happens if you click on a phishing link on iPhone? ›
- Disconnect Your Device. The first thing you need to do is immediately disconnect the compromised device from the Internet. ...
- Back Up Your Files. Now that you are disconnected from the Internet, you should back up your files. ...
- Change Your Credentials. ...
- Set Up a Fraud Alert.
Since an iPhone cannot have a true virus there is no way to scan for one. If your iOS version is up-to-date (currently iOS 15.5) and you have not jailbroken your iPhone or side loaded apps you have no risk of malware either.
Is it better to have an iCloud email or Gmail? ›Gmail has more organization features for inbox and email purposes. However, iCloud allows users to easily access and share files, documents, and photos across several devices. If you're looking for an email client, it might be best to go with Gmail.
What are the 2 possible signs that you have been hacked? ›- You get a ransomware message.
- You get a fake antivirus message.
- You have unwanted browser toolbars.
- Your internet searches are redirected.
- You see frequent, random popups.
- Your friends receive social media invitations from you that you didn't send.
- Your online password isn't working.
What does it look like when your iPhone is hacked? There isn't one example of what it looks like when your iPhone is hacked. You could get strange or inappropriate pop-ups or see apps you don't recognize on your phone. Your battery might drain quickly, and your phone might show higher data usage.
How do you know if your iPhone has been hacked 2022? ›The easiest way to tell if your iPhone has been hacked is by running a full device scan with top-tier antivirus security software. This will check your iPhone for any suspicious apps or activity and alert you to any unusual behaviors that may have gone unnoticed.
How do I know if my Apple phone has a virus? ›The best way to know if your iPhone has a virus is to check for the following signs: unfamiliar or crashing apps, lots of Safari pop-ups, unusual charges or data usage, a rapidly draining battery, or a consistently hot phone.
Is the Apple security warning real? ›Apple security pop-ups are tools fraudsters use to trick you into thinking your iOS device has contracted a virus, been hacked, or been compromised in some other way. The threat isn't real, and scammers simply seek to gather personal and financial information to defraud you.
Can someone hack my bank account with my email address? ›It's also possible hackers could use your email account to gain access to your bank account or credit card information, draining funds from an account, or racking up charges. They might even use your email and password to sign up for online sites and services, sticking you with monthly fees in the process.
What is difference between spam and phishing? ›Spam is unsolicited email, instant messages, or social media messages. These messages are fairly easy to spot and can be damaging if you open or respond. Phishing is an email sent from an Internet criminal disguised as an email from a legitimate, trustworthy source.
What is the number one target for phishing attacks? ›
Instead, they simply target an organization's weakest link—its employees. All they need to do is dupe just one person—sometimes out of hundreds or even thousands of employees—into opening an email or clicking a link or attachment. For more, read 3 Reasons You Need to Invest in Anti-Phishing Services.
What are some red flags of phishing? ›- 1 Urgent or threatening language. ...
- 2 Requests for sensitive information. ...
- 3 Anything too good to be true. ...
- 4 Unexpected emails. ...
- 5 Information mismatches. ...
- 6 Suspicious attachments. ...
- 7 Unprofessional design.
Just opening the phishing message without taking any further action will not compromise your data. However, hackers can still gather some data about you, even if all you did was open the email. They will use this data against you to create more targeted cyber attacks in the future.
What can a scammer do with my email address? ›- Target you with sophisticated phishing emails.
- Find more sensitive information about you — including where you live.
- Attempt to hack into your other online accounts.
- Impersonate you and scam your friends and family.
- Steal your identity and commit financial fraud.
- Don't click on any suspicious links. ...
- Don't download any attachments (unless you know where they come from) ...
- Be mindful of grammar. ...
- Don't assume an email is legitimate because it is listed as “urgent” ...
- Increase security.
An email from PayPal arrives telling the victim that their account has been compromised and will be deactivated unless they confirm their credit card details. The link in the phishing email takes the victim to a fake PayPal website and the stolen credit card information is used to commit further crimes.
What is the best method to check if an email link is legitimate? ›If a suspicious email contains a link, you can verify its legitimacy. Move your cursor over the link, but do not click it, hold your cursor there for a few seconds, and the destination of the link will pop up. A link that appears to go to one location, but actually links to another is a big red flag.
Should I be worried if my email is on the dark web? ›People might be trying to access your accounts. Unfortunately, the dark web is where you can find a number of criminals and cybercriminals trying to break into your accounts and get access to your money, personal information, login details for other websites, and more.
What is slam method? ›What is SLAM? The SLAM (Stop… Look… Assess… Manage) technique reminds workers to stop work if they think their health and safety is at risk.
Should I reset my iPhone if I clicked on phishing link? ›Nope. No worries. You would have been fine even if you had not set your iPhone to factory settings and restored from a backup. The phishing websites do not hack your device or implant a virus or implant malware.
Can someone hack my iPhone if I click a link? ›
Just like on your computer, your iPhone can be hacked by clicking on a suspicious website or link. If a website looks or feels "off" check the logos, the spelling, or the URL.
Can you get hacked from opening an email on iPhone? ›No, you can't get hacked by simply opening an email. This was possible before when emails would run JavaScript in the preview pane allowing malware to spread without any action from the user.
Does resetting iPhone remove spyware? ›A lot of people think that performing a factory reset will remove the spyware from their iPhone. This is not correct. While factory reset does remove all your data including the spyware app(s) from the device, there is still a possibility that the spyware will be installed again.
Can I scan my iPhone for spyware? ›Certo AntiSpy is an app for your computer that you can use to scan your iPhone and detect if someone has installed spyware. Here's why it's perfect for keeping your iPhone secure: Easily installed onto your PC – just plug in your iPhone and click “Scan”. Uncover spyware, tracking apps, keyloggers and more.
Is there a free virus scan for iPhone? ›Secure Your iPhone and iPad With a Free Antivirus App
Avira Free Security is the best free antivirus iOS app, providing a VPN, WiFi scanner, and Privacy Manager at no cost to you. However, even this doesn't give you the best protection.
Gmail. Google services are a great solution for people with an Android smartphone but they also work well with Apple. Google includes IMAP with 15 GB of storage as part of their free Gmail service.
Which is safer Apple Mail or Gmail? ›Apple and Google are two of the most popular and reliable tech companies in the world, so neither security nor reliability are concerns with either Gmail or Apple Mail. You can consider this category a tie.
Is Apple Mail safer than Gmail? ›Security and privacy
Both the Gmail and Apple Mail apps use encryption. However, while all Apple Mail is encrypted with S/MIME, only paid Google Workspace accounts use S/MIME encryption. All other Gmail accounts use TLS encryption.
Can phishing link install malware on iphone?
Tips to Identify and Report Phishing Emails and Other Scams to Apple
How to check if an Email is Real or Fake / Scam on iPhone?
It's important to know that Apple does not send security warnings, so you should not follow any instructions. What you should do is run your device through a good security app to avoid falling victim to these scams.
What is Apple ID phishing? ›
Scammers use fake Caller ID info to spoof phone numbers of companies like Apple and often claim that there's suspicious activity on your account or device to get your attention. Or they may use flattery or threats to pressure you into giving them information, money, and even Apple gift cards.
How do I secure my Apple email? ›Go to Settings > Mail > Privacy Protection. Turn on Protect Mail Activity.
What happens if you click on a phishing link on iPhone? ›- Disconnect Your Device. The first thing you need to do is immediately disconnect the compromised device from the Internet. ...
- Back Up Your Files. Now that you are disconnected from the Internet, you should back up your files. ...
- Change Your Credentials. ...
- Set Up a Fraud Alert.
Since an iPhone cannot have a true virus there is no way to scan for one. If your iOS version is up-to-date (currently iOS 15.5) and you have not jailbroken your iPhone or side loaded apps you have no risk of malware either.
How do you know if someone is using you Apple ID? ›Use the web to see where you're signed in
From the Devices section of your Apple ID account page, you can see all of the devices that you're currently signed in to with your Apple ID, including Android devices, consoles, and smart TVs: Sign in to appleid.apple.com,* then select Devices.