Misuse of legitimate Apple notifications

New phishing wave exploits Apples own servers

Apple
Facebook
X
LinkedIn
Reddit
WhatsApp
Bildquelle: rukawajung/Shutterstock.com

Cybercriminals are exploiting Apple’s automated security notification system to send fraudulent purchase alerts that bypass virtually every spam filter in existence.

How the attack works

The method is as simple as it is effective. Attackers create a new Apple ID or use a compromised account and embed their phishing message directly into the account’s name fields. Since these fields have character limits, the bait text is split across the first and last name fields. The result might read something like: “User, your iPhone purchase of $899 via PayPal has been confirmed. To cancel, please call 1-802-353-0761.”

Ad

When the attacker then modifies the account’s shipping information, Apple automatically triggers a security notification sent to the email address on file. Because Apple’s standardized notifications include the account holder’s name, the fraudulent text gets embedded directly into the layout of an official Apple email.

Why spam filters fail

To any spam filter, the message looks identical to a legitimate Apple security warning. There is no malicious link and no infected attachment for a scanner to detect. The entire attack relies on the content of a text field and its psychological impact on the recipient. The emails are sent from appleid@id.apple.com and originate from IP addresses owned by Apple, passing strict SPF, DKIM and DMARC authentication checks with a clean result.

The psychology of callback phishing

This type of attack is known as callback phishing. The goal is to induce panic by pretending an unauthorized purchase of expensive hardware has taken place. The recipient believes their account has been hacked or their payment information misused. Rather than clicking a link, they are pressured into calling a support number listed in the message.

Ad

At the other end of the line are not Apple employees but professional scammers. Once the victim calls, the fraudsters attempt to gain their trust, often claiming the account needs to be secured. Victims are frequently instructed to install remote access software. Once attackers gain access to the victim’s computer, they can steal banking credentials, install ransomware or exfiltrate private data. In other cases, users are asked directly for their credit card details or passwords to supposedly cancel the transaction.

A known vulnerability without a fix

This campaign illustrates a growing trend of threat actors hijacking features of legitimate websites for malicious purposes. It is not the first time Apple services have been exploited this way. Similar incidents occurred with iCloud calendar invitations, where spam messages appeared directly in users’ calendars.

Although Apple has been informed of this specific vulnerability, a fix has yet to materialize. The system still allows arbitrary text to be entered into name fields, which is then carried over unfiltered into security emails. Until Apple introduces stricter validation of name fields or prevents these fields from being embedded in security notifications, the vulnerability remains open.

How to protect yourself

Users should approach unexpected security notifications with skepticism. If an email reports a purchase you did not make, do not call the phone number listed in the email. Instead, navigate directly to the official Apple website in your browser and log into your account to check your order history and account details.

A clear warning sign in these particular emails is the unusual formatting of the name field and the mention of third party services like PayPal within an Apple ID notification. Apple processes purchases through its own billing system and would never include a PayPal cancellation number inside a name field of a security alert. As trusted company infrastructure is increasingly turned against their own customers, critically examining every automated message remains one of the most important lines of defense.

Lisa Löw

Lisa

Löw

Junior Editor

it-daily.net

Ad

Weitere Artikel