{"id":179,"date":"2008-07-03T08:07:56","date_gmt":"2008-07-03T07:07:56","guid":{"rendered":"http:\/\/blog.intego.com\/?p=179"},"modified":"2008-07-03T08:07:56","modified_gmt":"2008-07-03T07:07:56","slug":"bogus-apple-phishing-e-mails-spotted-in-the-wild","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/","title":{"rendered":"Bogus Apple Phishing E-Mails Spotted in the Wild"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/Apple-phish.jpg\"><\/p>\n<p>Bogus e-mails purporting to be from Apple have been spotted in the wild. They feature a subject line of &#8220;Important : Billing Problem&#8221; and an outdated .Mac graphic (if you&#8217;ve been following the Mac news, you know that .Mac is becoming MobileMe this month). The messages ask you to update your payment information so your service is not interrupted. The link in the e-mail message takes you to a well-crafted copy of an Apple Store page where you can enter your credit card information, which will be promptly sent on to organized crime minions who will use that number as much as possible.<\/p>\n<p>Remember, you can check the URL behind any link in an e-mail message by hovering your cursor over the link, and waiting for a tooltip to pop up showing the URL. Also, if you click such a link, you can tell that it&#8217;s not Apple&#8217;s web site; just look at the first letters of the link (following www): in this case, it&#8217;s a hacked server that has a \/media\/www.apple.com\/us\/ path in it leading to the evil page. In these messages, clicking on the graphic takes you to an actual .Mac page (the Learning Center), perhaps to suggest that if that link is real then the payment information link is real as well.<\/p>\n<p>Remember that <a href=\"https:\/\/www.intego.com\/personalAntispam\/\">Intego Personal Antispam<\/a> can protect you from phishing e-mails by spotting when displayed URLs are different from the links behind them. But always check the URL in your browser when you click any link expecting to provide credit card information, just to be sure, and look for a padlock in your browser window showing that it is a secure page; hackers can&#8217;t spoof the padlock icon. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bogus e-mails purporting to be from Apple have been spotted in the wild. They feature a subject line of &#8220;Important : Billing Problem&#8221; and an outdated .Mac graphic (if you&#8217;ve been following the Mac news, you know that .Mac is becoming MobileMe this month). The messages ask you to update your payment information so your [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Bogus e-mails purporting to be from Apple have been spotted in the wild. They feature a subject line of &quot;Important : Billing Problem&quot; and an outdated .Mac\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bogus Apple Phishing E-Mails Spotted in the Wild - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Bogus e-mails purporting to be from Apple have been spotted in the wild. They feature a subject line of &quot;Important : Billing Problem&quot; and an outdated .Mac\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-07-03T07:07:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/Apple-phish.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/Apple-phish.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/Apple-phish.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/\",\"name\":\"Bogus Apple Phishing E-Mails Spotted in the Wild - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#primaryimage\"},\"datePublished\":\"2008-07-03T07:07:56+00:00\",\"dateModified\":\"2008-07-03T07:07:56+00:00\",\"description\":\"Bogus e-mails purporting to be from Apple have been spotted in the wild. They feature a subject line of \\\"Important : Billing Problem\\\" and an outdated .Mac\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bogus Apple Phishing E-Mails Spotted in the Wild\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Bogus Apple Phishing E-Mails Spotted in the Wild\",\"datePublished\":\"2008-07-03T07:07:56+00:00\",\"dateModified\":\"2008-07-03T07:07:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#webpage\"},\"wordCount\":294,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/Apple-phish.jpg\",\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Bogus e-mails purporting to be from Apple have been spotted in the wild. They feature a subject line of \"Important : Billing Problem\" and an outdated .Mac","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/","og_locale":"en_US","og_type":"article","og_title":"Bogus Apple Phishing E-Mails Spotted in the Wild - The Mac Security Blog","og_description":"Bogus e-mails purporting to be from Apple have been spotted in the wild. They feature a subject line of \"Important : Billing Problem\" and an outdated .Mac","og_url":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-07-03T07:07:56+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/Apple-phish.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/Apple-phish.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/Apple-phish.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/","name":"Bogus Apple Phishing E-Mails Spotted in the Wild - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#primaryimage"},"datePublished":"2008-07-03T07:07:56+00:00","dateModified":"2008-07-03T07:07:56+00:00","description":"Bogus e-mails purporting to be from Apple have been spotted in the wild. They feature a subject line of \"Important : Billing Problem\" and an outdated .Mac","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Bogus Apple Phishing E-Mails Spotted in the Wild"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Bogus Apple Phishing E-Mails Spotted in the Wild","datePublished":"2008-07-03T07:07:56+00:00","dateModified":"2008-07-03T07:07:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#webpage"},"wordCount":294,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/bogus-apple-phishing-e-mails-spotted-in-the-wild\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/Apple-phish.jpg","articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2T","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/179"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=179"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/179\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}