【The Pursuit of Lust】
Some Apple users are The Pursuit of Lustreportedly being targeted by a sophisticated attack, requesting them to hand over their Apple ID credentials over and over again.
According to KrebsonSecurity, the attack starts with unsuspecting Apple device owners getting dozens of system-level messages, prompting them to reset their Apple ID password. If that fails, a person pretending to be an Apple employee will call the victim and try to convince them into handing over their password.
SEE ALSO: Apple confirms dates for WWDC 2024This is exactly what happened to entrepreneur Parth Patel, who described their experience on Twitter/X. First, all of Patel's Apple devices, including their iPhone, Watch, and MacBook, started displaying the "Reset Password" notifications. After Patel clicked "Don't Allow" to more than one hundred requests, the fake Apple Support called, spoofing the caller ID of Apple's official Apple Support line. The fraudster Apple employee actually knew a lot of Patel's real data, including email, address, and phone number, but they got their name wrong, which had confirmed Patel's suspicions that they were under attack.
You May Also Like
This Tweet is currently unavailable. It might be loading or has been removed.
While the attack was ultimately unsuccessful in this example, it's easy to imagine it working. The victim might accidentally allow the password reset (mistakes are easy to happen when you have to click on something hundreds of times), or they could fall for the fairly convincing, fake Apple Support call.
Patel's example isn't isolated, either; KrebsonSecurity has details on a very similar attack that happened to a crypto hedge fund owner identified by his first name, Chris, as well as a security researcher identified as Ken. In Chris' example, the attack persisted for several days, and also ended with a fake Apple Support call.
How did the attackers know all the data needed to perform the attack, and how did they manage to send system-level alerts to the victims' phones? According to KrebsonSecurity, the hackers likely had to get a hold of the victim's email address and phone number, associated with their Apple ID. Then they used an Apple ID password reset form, that requires an email or phone number, alongside a CAPTCHA, to send the system-level, password reset prompts. They also likely used a website called PeopleDataLabs to get information on both the victim and Apple employees they impersonated.
But there could also be a bug in Apple's systems, which should in theory be designed not to allow someone to abuse the password reset form and send dozens of requests in a short period of time (Apple did not respond to KrebsonSecurity's request for comment).
Related Stories
- I used the Apple Vision Pro on a flight to Costa Rica — and it was chaotic
- Apple confirms dates for WWDC 2024
- Apple, Google, and Meta are being investigated by the EU under new Big Tech regulation
- Apple might finally let you freely customize Home Screen icons on iPhone
- Vulnerability found in Apple's Silicon M-series chips – and it can't be patched
It appears that there's no easy or foolproof way to protect oneself from such an attack at this time, save from changing one's Apple ID credentials and tying them to a new number and email. It's hard to tell how widespread this attack is, but Apple users should be vigilant and triple-check the authenticity of any password reset request, even if it appears to come from Apple itself.
For on spammers and scammers, check out Mashable's series Scammed, where we help you navigate a connected world that’s out for your money, your information, or just your attention.
Topics Apple Cybersecurity
Search
Categories
Latest Posts
Boeing's new VR simulator immerses astronauts in space training
2025-06-26 13:39Samsung and Huawei kickstart 'hole punch' smartphone trend
2025-06-26 13:13Jason Momoa leads an epic haka dance during 'Aquaman' premiere
2025-06-26 12:57FBI arrests two members of hacker group Crackas With Attitude
2025-06-26 12:01Whale Vomit Episode 5: Startup Monarchy
2025-06-26 11:37Popular Posts
Best keyboard deals: Save on Asus gaming keyboards at Amazon
2025-06-26 13:40If bamboo bikes are so great, why don't they sell well in China?
2025-06-26 13:12Elon Musk in 60 Minutes interview: 'I do not respect the SEC’
2025-06-26 12:5921 blunt and bizarre one
2025-06-26 12:44Waymo data shows humans are terrible drivers compared to AI
2025-06-26 11:32Featured Posts
Skype is finally shutting down
2025-06-26 12:50'Mary Poppins Returns', but the magic's gone: Review
2025-06-26 12:30Matt Lauer becomes the symbol of frustration with the media
2025-06-26 12:02Store sign tells the hilariously painful truth about 'No Man's Sky'
2025-06-26 11:50Draper vs. Arnaldi 2025 livestream: Watch Madrid Open for free
2025-06-26 11:33Popular Articles
Fritz vs. Ruud 2025 livestream: Watch Madrid Open for free
2025-06-26 13:32Even the IRL store is an automated, digital experience
2025-06-26 13:20Let these men teach you how to smile, Hillary Clinton
2025-06-26 12:54Apple is actively looking at AI search for Safari
2025-06-26 10:59Newsletter
Subscribe to our newsletter for the latest updates.
Comments (62711)
Creation Information Network
Best JBL deal: Save $80 on JBL Xtreme 4 portable speaker
2025-06-26 13:30Sky Information Network
Sex ed content censored by algorithms that think it's porn
2025-06-26 12:18Habit Information Network
Facial recognition tech spreads to car rentals
2025-06-26 12:08Happiness Information Network
NASA's Voyager 2 spacecraft is now flying through the stars
2025-06-26 11:19New Knowledge Information Network
Apple iPhone 17 Pro leaks highlight major new design change
2025-06-26 11:13