iPhone 14 hasn't even been released, and there's already a scam using an Apple cell phone as bait

iPhone 14 hasn’t even been released, and there’s already a scam using an Apple cell phone as bait

The iPhone 14 will not be launched until September 7, during Apple’s annual event, but it has been generating a lot of anticipation among consumers for months. All this euphoria from fans of the brand did not go unnoticed by cybercriminals, who are already trying to implement scams using the smartphone as bait.

A survey by cybersecurity firm Kaspersky, conducted between August 10-25, found nearly 9,000 phishing sites (a scam to obtain personal data and passwords), with alleged offers of the new Apple device.

Experts discovered 1,023 records of fake pages using the term “iPhone” only last Thursday (25) – twice the daily rate for detecting fraudulent websites. Through them, scammers try to “empty the wallets of victims and steal their Apple ID credentials,” according to the company.

“The same technique was used before the release of Playstation 5 and the movies Black Widow and Spider-Man 3, where criminals are always looking for topics that attract the most potential victims. Someone to hide the scam,” explains Fabio Assolini, Head of Global Latin America Research and Analysis at Kaspersky.

How are the strikes?

According to Kaspersky, scams created before the launch of a new mobile phone take advantage of consumer expectations. They may offer a discounted pre-sale or even an “opportunity” to purchase the product even before the official launch.

When choosing the desired iPhone, the person will be taken to a common page, where he must enter personal and credit card data to make the “purchase”. Upon completion, the amount will be debited from the card – but, of course, the product will never be charged. In addition, and perhaps most dangerously, all the data of the victim will be in the possession of the fraudster, who will be able to clone the card for use in future frauds.

Assolini asserts: “If a person is oblivious, he will fall in love with a coup.” That is why it is so important for people to know how to identify fraud quickly. “One of the points of interest is the advertising image: since new smartphones have not yet been released, criminals often use images of previous models to lure victims.

Example of a fake (phishing) page intended to steal your Apple ID credentials

Photo: Kaspersky / Reproduction

Apple ID theft

According to Kaspersky, cybercriminals’ interest in exploiting the new iPhone goes beyond financial gain. Some scammers also seek Apple ID credentials – an account that all users of Apple products must have, in which various data such as passwords, credit cards, and even photos are stored.

For this, scammers create websites that nicely mimic the standard Apple login page, asking for your email and password. If the person fills in this information, the scammers can access all your services like Apple Store, Apple Music, iCloud, FaceTime, etc.

In addition, they can access “autofill” email addresses and login passwords, as well as saved electronic payment information.

They also scan the iCloud cloud, where videos and personal photos are stored, for scans and offending photos – which can later be used for identity theft or even extortion scams.

How do you protect yourself?

Check out Kaspersky’s tips to protect yourself from scams involving the new iPhone:

  • Check the legitimacy of the site before entering your personal or financial information. To do this, compare the address you are accessing with the official website and see if there are any spelling errors;
  • Be wary of all incoming links, especially via social networks. Always do direct access (write the official address of the company);
  • Don’t trust paid results in online searches. give preference to organic results, as criminals pay for fake links to appear at the top of searches;
  • Avoid accessing important accounts, such as bank accounts, that are connected to wireless public Wi-Fi networks. Criminals can create open networks to monitor traffic and copy access data or redirect access to fake websites;
  • Always use a reliable security solution to block malicious files and fake websites.

Remember that it is also necessary to activate the two-factor authentication feature, in all digital services where it is available. In the case of an Apple ID, to activate it, follow these steps:

  1. Go to Settings> [seu nome] > password and security;
  2. Click “Enable Two-Factor Authentication” and then click “Continue”;
  3. Enter a trusted phone number where you want to receive two-factor authentication verification codes (this could be your iPhone);
  4. You can choose to receive codes via text message or automated phone call;
  5. Click Next and enter the verification code sent.

#iPhone #hasnt #released #scam #Apple #cell #phone #bait

Leave a Comment

Your email address will not be published.