SELECT LANGUAGE BELOW

Phishing scam targets Apple iCloud Calendar and evades spam filters to gather information

Phishing scam targets Apple iCloud Calendar and evades spam filters to gather information

Phishing attacks are evolving and becoming more advanced, now exploiting well-known platforms to new heights. Rather than relying on emails that look suspicious, cybercriminals are taking advantage of Apple’s iCloud Calendar Invite system. This allows them to send phishing content directly from Apple’s email servers, which is quite crafty.

This technique enables these fraudulent communications to slip past spam filters, creating the illusion of legitimacy for unsuspecting users. The aim is to deceive victims into calling fake support numbers while claiming there are issues with nonexistent PayPal transactions. The victims are then manipulated into providing remote access to their devices or sharing sensitive personal information.

The New Evite Phishing Scam Targets Emotional Events

One of the more recent scams involves using invitations for significant events to lure people in. Scammers misuse Apple’s official email domain to lend credibility to their phishing attempts. Instead of sending messages that raise immediate suspicion, they send calendar invites from noreply@email.apple.com. The phishing text is cleverly hidden in the Notes section of the event, making it appear as a legitimate notification.

These invitations are often sent to Microsoft 365 email addresses, which are then automatically forwarded to multiple recipients, thereby broadening the scam’s reach. Normally, when an email is forwarded, it would fail SPF (Sender Policy Framework) checks. However, Microsoft 365 uses a method called Sender Rewrite Scheme (SRS) to adjust the return path, allowing it to pass security checks and appear not suspicious at all. This manipulation means that emails are more likely to land in the user’s inbox without raising alarms, increasing the chance that victims will engage with the content.

The Danger of These Phishing Scams

This current wave of phishing scams is particularly perilous because it exudes an air of legitimacy. Since emails come straight from Apple’s servers, people are less inclined to suspect any wrongdoing. The scam messages often create a false sense of urgency or panic by alleging unauthorized activity related to a large PayPal transaction. They include a phone number for recipients to “contact support,” but this leads directly to a scammer.

Once a victim calls this number, the scammers pose as support agents, insisting that their computer is compromised. They may then press the victim to download remote access software under the guise of protecting their account. Sadly, this access is typically used for stealing personal data, installing malware, or gaining access to bank information. Because the original message passes through security checks, victims often act without hesitation.

How to Protect Yourself from iCloud Calendar Phishing

Here are some practical steps you can take to avoid falling into the trap of these sophisticated phishing scams:

1) Be Cautious with Unexpected Calendar Invitations

If you receive a calendar invite that looks strange or contains unexpected messages, don’t open it. Actual businesses seldom send important security warnings or payment disputes through calendar invites. Always validate claims by logging into your official account directly.

2) Don’t Use the Numbers in Emails or Calendar Invites

These phishing scams typically feature phone numbers leading to scammers who impersonate tech support. Use contact details found directly on the company’s official website instead.

3) Install Reliable Antivirus Software

Antivirus programs can protect your device from malware threats and block dangerous downloads. It’s essential to keep your antivirus software current to ward off new threats.

4) Delete Your Personal Information from Public Lists

Scammers can craft convincing phishing messages because they have access to personal data. Utilizing personal data deletion services can help remove your information from the public domain, making it harder for attackers to target you effectively.

5) Use a Password Manager

Password managers can generate and store complex passwords for your accounts. This way, you avoid using easily guessed or reused passwords that can lead to unauthorized access. Some password managers even include tools to check if your login details have been compromised.

6) Keep Your Software Up-to-Date

Regular updates for your operating system and applications are crucial. They patch security vulnerabilities often exploited in phishing attacks, thereby reducing your exposure to potential threats.

Key Takeaways

In summary, scammers are taking phishing to unsettling new levels by manipulating trusted platforms to distribute harmful content. The best defense is to be skeptical of unexpected calendar invitations, especially those containing unusual messages or phone numbers. Avoid reacting to calls or links in these messages and instead, go to the official website to check for any suspicious activity.

Have you encountered a phishing scam disguised as a valid message? Feel free to share your experience.

Facebook
Twitter
LinkedIn
Reddit
Telegram
WhatsApp

Related News