Some Apple users are Flashpoint X Porn (1997)reportedly being targeted by a sophisticated attack, requesting them to hand over their Apple ID credentials over and over again.
According to KrebsonSecurity, the attack starts with unsuspecting Apple device owners getting dozens of system-level messages, prompting them to reset their Apple ID password. If that fails, a person pretending to be an Apple employee will call the victim and try to convince them into handing over their password.
SEE ALSO: Apple confirms dates for WWDC 2024This is exactly what happened to entrepreneur Parth Patel, who described their experience on Twitter/X. First, all of Patel's Apple devices, including their iPhone, Watch, and MacBook, started displaying the "Reset Password" notifications. After Patel clicked "Don't Allow" to more than one hundred requests, the fake Apple Support called, spoofing the caller ID of Apple's official Apple Support line. The fraudster Apple employee actually knew a lot of Patel's real data, including email, address, and phone number, but they got their name wrong, which had confirmed Patel's suspicions that they were under attack.
This Tweet is currently unavailable. It might be loading or has been removed.
While the attack was ultimately unsuccessful in this example, it's easy to imagine it working. The victim might accidentally allow the password reset (mistakes are easy to happen when you have to click on something hundreds of times), or they could fall for the fairly convincing, fake Apple Support call.
Patel's example isn't isolated, either; KrebsonSecurity has details on a very similar attack that happened to a crypto hedge fund owner identified by his first name, Chris, as well as a security researcher identified as Ken. In Chris' example, the attack persisted for several days, and also ended with a fake Apple Support call.
How did the attackers know all the data needed to perform the attack, and how did they manage to send system-level alerts to the victims' phones? According to KrebsonSecurity, the hackers likely had to get a hold of the victim's email address and phone number, associated with their Apple ID. Then they used an Apple ID password reset form, that requires an email or phone number, alongside a CAPTCHA, to send the system-level, password reset prompts. They also likely used a website called PeopleDataLabs to get information on both the victim and Apple employees they impersonated.
But there could also be a bug in Apple's systems, which should in theory be designed not to allow someone to abuse the password reset form and send dozens of requests in a short period of time (Apple did not respond to KrebsonSecurity's request for comment).
It appears that there's no easy or foolproof way to protect oneself from such an attack at this time, save from changing one's Apple ID credentials and tying them to a new number and email. It's hard to tell how widespread this attack is, but Apple users should be vigilant and triple-check the authenticity of any password reset request, even if it appears to come from Apple itself.
For on spammers and scammers, check out Mashable's series Scammed, where we help you navigate a connected world that’s out for your money, your information, or just your attention.
Topics Apple Cybersecurity
Google to fight Apple Watch headUber tries to have it both ways with self5 Facebook Live streams that defined the news in 2016Toddler's adorable reaction to getting adopted has the internet in tearsHey procrastinators, here's how to score a holiday flight dealA NASA rover sent home an immersive Mars panorama. Watch the video.Please, Manny Ramirez, don't make another comebackGird your wallets, gamers: The Steam Winter Sale is now liveTiger Woods continues making suspect decisions, golfs with Donald Trump9 animals that just want you to give them a big belly rub for ChristmasBride and groom who love to eat get the ultimate wedding photosSend off 2016 with HBO's 'Game of Thrones' marathonUber blames iOS for still tracking your location even when you're not using the appGird your wallets, gamers: The Steam Winter Sale is now liveDonald Trump loved exclamation points in 2016 almost as much as he loves himself (!!!)How to shoot better photos of holiday lights with your iPhoneKFC China has another weird tech idea to get you to eat fast foodA NASA rover sent home an immersive Mars panorama. Watch the video.Keep the belief in Santa alive and well with this Chrome extensionRicky Gervais and Seth Rogen had a gloriously phallic Twitter exchange Rosetta bids farewell tweeting cute cartoons in different languages 'I will continue to stand on my feet': Alicia Machado responds to Trump's tweetstorm Yahoo hack could have affected billions of accounts, former exec claims It looks like Donald Trump appeared in a soft core porn film 'Do Not Resist:' 6 worrying moments from new film on warrior cops Here's a stunning pup portrait Snoop Dogg painted for his BFF, Martha Stewart Weight loss app counts calories with your food pics Mark Wahlberg's 'Deepwater Horizon' will have you crying on the edge of your seat Bye, bye, Rosetta: The best moments from the spacecraft's historic mission No, this iPhone 7 probably didn’t just explode on its own Trump unleashes tweetstorm on former Miss Universe Alicia Machado McDonalds releases pumpkin spice fries because our obsession knows no limits Philippine president compares himself to Hitler in his latest offensive comment Knicks' Joakim Noah skips cadet dinner over anti When will Apple unveil the new MacBook Pro? Another Miss Universe contestant recalls being body Vegans embrace the idea of changing the name of vegan cheese to 'Gary' Twitter gave Rosie O'Donnell the worst 'who to follow' recommendation ever Listen to Hillary Clinton discuss basement Google has a new central blog called Keyword
2.4517s , 8224.1875 kb
Copyright © 2025 Powered by 【Flashpoint X Porn (1997)】,Openness Information Network