Many iPhone users could not even imagine normal functioning without iCloud, because this service is used, for example, to back up photos and videos that you took on your iPhone. If you upgrade to a new model or if your phone is lost or stolen, all your persol photos will be stored securely in the cloud. But this time, the attackers are targeting gullible iPhone users whose bank accounts they want to empty. And they use iCloud for that.
You may have already received an email on your email page that looks like it was sent directly from Apple. The iCloud logo is present in the email, and an integral part of it is a warning that “Your preferred payment method has expired”. And a few days before the current date. On the next line you will know that “without iCloud, you won’t be able to store all of the above data and files in the cloud”. You can “fix” the situation by clicking a button that will take you to a fake iCloud site.
This is what a new attack aimed at iCloud users looks like. Under the pretext of quickly deleting photos and videos from iCloud, the service “gives” you 50 GB of free space in an email. But only after you enter your payment and account details on fake sites. This is of course a fake, iCloud space will not increase, and your account will also be stolen
On them, hackers, as part of an alleged loyalty program, warn about the possibility of getting 50 GB in iCloud for free, otherwise they threaten that the files will be deleted. You can “claim” your free 50GB at the click of a button, but in reality, you’re just handing over all of your initials, including your credit card details and your Apple ID, to scammers on a golden platter. And not only will you not get additiol GB for iCloud, but the scammers will completely empty your account!
Of course, there are many telltale signs in scam emails that it is not a genuine message from Apple. The email is missing the Apple logo and your address, some parts are oddly formatted, misspelled, poorly translated, and when you look at the email address, you’ll find that the email isn’t actually from Apple, it’s just pretending to be.
Another possible form of email scam. Some users are sent the same messages twice a day for several weeks. Fraudsters are just waiting for someone to “succumb” and enter their data into the application under the threat of losing photos
But the attack can also look the other way around, your inbox will receive a “confirmation” of the purchase from the App Store, iTunes, iBooks Store or Apple Music, which, of course, you have no idea. The transaction can be “rolled back” and all you have to do is provide your payment details for verification. Of course, this is also a method meant only to pamper your account.
Yes, the scam looks pretty simple, but if you’re dealing with many things at the same time and you’re still afraid that your photos might be deleted, you can ignore all the warning signs and actually put smeared data on fake Apple pages. . Thus, the protection is obvious – never enter your payment details directly on new open pages using buttons or links in emails. In the window that opens, check in the address bar whether you are really on the icloud.com or apple.com site, and not on a subdomain that only pretends to be an Apple site.
Bell ringers are back
For all intents and purposes, Apple has [email protected] and [email protected] email addresses that you can use to check for authentic emails or forward scam emails that try to look like they were sent directly by Apple. However, you also need to protect yourself from other threats related to fraudulent calls and suspicious text messages with links, which we informed you about in this article.
In addition, a few days ago we received a call from Sri Lanka (area code +94) to the editorial phone, so it is possible that foreign “dialers” are slowly returning to the event before the summer holidays. The last time large-scale attacks on the Czech Republic were in February of this year. If you receive a call from a foreign number (many phones immediately show the country the number is from on the incoming call display), mute or reject the call and immediately move the caller to the blocked list. Definitely do not call back.