	{"id":22255,"date":"2016-08-05T12:32:30","date_gmt":"2016-08-05T19:32:30","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=22255"},"modified":"2016-08-25T10:50:38","modified_gmt":"2016-08-25T17:50:38","slug":"clever-phishing-scam-targets-your-apple-id-and-password","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/","title":{"rendered":"Clever Phishing Scam Targets Your Apple ID and Password"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-55195 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-scam-appleid.jpg\" alt=\"Phishing scam web sites want Apple ID and password\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-scam-appleid.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-scam-appleid-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-scam-appleid-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Apple users need to be aware of an ongoing\u00a0phishing campaign that appears to be ramping up efforts the past couple days. Scammers have\u00a0found\u00a0a clever way to generate phishing websites\u2014and they&#8217;re after your Apple ID and password.<\/p>\n<p>What&#8217;s happening is an active\u00a0phishing campaign\u00a0by way of fake Apple websites attempting to slurp up as many Apple IDs and passwords as possible. We&#8217;ve seen these types of phishing scams before, but the\u00a0person or group behind this campaign\u00a0appears to be very determined, creating tens and possibly hundreds of phishing websites all designed to steal your Apple ID and password.<\/p>\n<p>Streams of these phishing pages have been uncovered the past two days, and subsequently posted to Twitter by vigilant users in the security community:<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/malwrhunterteam\">@malwrhunterteam<\/a> <a href=\"https:\/\/twitter.com\/JAMESWT_MHT\">@JAMESWT_MHT<\/a> <br \/>Clever way to generate <a href=\"https:\/\/twitter.com\/hashtag\/phishing?src=hash\">#phishing<\/a> page:<br \/>http:\/\/account-secured-fraud[.]com <a href=\"https:\/\/t.co\/ec52jE0xPW\">pic.twitter.com\/ec52jE0xPW<\/a><\/p>\n<p>&mdash; ExecuteMalware (@executemalware) <a href=\"https:\/\/twitter.com\/executemalware\/status\/760161142052360192\">August 1, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/phishing?src=hash\">#phishing<\/a> verify-payment-account.]com <a href=\"https:\/\/twitter.com\/AppleSupport\">@AppleSupport<\/a> host <a href=\"https:\/\/t.co\/UWZblkgnI4\">https:\/\/t.co\/UWZblkgnI4<\/a> cc <a href=\"https:\/\/twitter.com\/malwrhunterteam\">@malwrhunterteam<\/a> <a href=\"https:\/\/t.co\/g8HDVIwxRa\">pic.twitter.com\/g8HDVIwxRa<\/a><\/p>\n<p>&mdash; JAMESWT (@JAMESWT_MHT) <a href=\"https:\/\/twitter.com\/JAMESWT_MHT\/status\/761155406949416960\">August 4, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Upon discovery, many of these\u00a0phishing websites have, of course, been shut down. But the scam isn&#8217;t over. New sites appear to be popping up, all\u00a0registered under the same name,\u00a0email address and country. One of the new scam sites is currently catching anti-phishing filters in some browsers, but not others.<\/p>\n<p>For example, as of this writing Firefox does not alert visitors of a phishing attempt to one of the malicious sites:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-55177\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-firefox-browser.png\" alt=\"appleid-verification dot com phishing site in Firefox browser\" width=\"500\" height=\"476\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-firefox-browser.png 1338w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-firefox-browser-150x143.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-firefox-browser-300x285.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-firefox-browser-1024x974.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-firefox-browser-657x625.png 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Google&#8217;s Chrome browser will alert visitors of the deceptive site:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-55180\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-chrome-browser.png\" alt=\"appleid-verification phishing site Google Chrome browser\" width=\"500\" height=\"349\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-chrome-browser.png 925w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-chrome-browser-150x105.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-chrome-browser-300x209.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-chrome-browser-657x458.png 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Apple&#8217;s Safari browser will also alert visitors of the suspected phishing site:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-55183\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-safari-browser.png\" alt=\"appleid-verification Phishing site Safari browser\" width=\"500\" height=\"359\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-safari-browser.png 760w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-safari-browser-150x108.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-safari-browser-300x215.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/appleid-verification-phishing-site-safari-browser-657x471.png 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>The duplicating phishing site, which is popping up under\u00a0numerous URLs, is so deceptive\u00a0it\u00a0even offers\u00a0legitimate links to Apple.com in order to trick unsuspecting visitors into thinking the page is legit.<\/p>\n<p>Therefore, as we\u00a0head into\u00a0the weekend, we strongly encourage\u00a0everyone to be vigilant about where you\u00a0enter personal information online.\u00a0We will keep you updated as this story evolves, but in the meantime, there are\u00a0a few things\u00a0to keep in mind to\u00a0stay safe.<\/p>\n<h3>How scammers\u00a0trick you\u00a0into visiting\u00a0phishing sites<\/h3>\n<p>Phishing scams have been causing serious problems for email users seemingly forever. Most of the time, phishing emails arrive in your inbox (or junk email, depending on your rules) pretending to from be your bank, utility company or other online payment system you use. Those messages request you to verify your accounts or to confirm your billing information, often leading victims to spoofed sites that ask you to update your credit card information or other identifying information.<\/p>\n<p>Although such scams\u00a0<a href=\"http:\/\/www.phishing.org\/history-of-phishing\/\" target=\"_blank\">originated sometime around the year 1995<\/a>, phishing emails and websites pretending to be from Apple are not as common, but they do happen.<\/p>\n<p>You have probably seen Apple phishing emails in your email junk box\u2014unfortunately, some of these bogus\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/\" target=\"_blank\">phishing emails can look very real<\/a>. Just the other day I got one from a scammer\u00a0phishing for my Apple ID. An email claiming to be from &#8220;Apple Inc&#8221; erratically tells me: &#8220;Notice of Expiry of Your apple ID ref U-54614.&#8221;<\/p>\n<p>The bogus email looked this:<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/Phishing-Scam-Wants-Apple-ID.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-22257\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/Phishing-Scam-Wants-Apple-ID.png\" alt=\"Phishing scam email contents\" width=\"573\" height=\"525\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/Phishing-Scam-Wants-Apple-ID.png 573w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/Phishing-Scam-Wants-Apple-ID-150x137.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/Phishing-Scam-Wants-Apple-ID-300x274.png 300w\" sizes=\"(max-width: 573px) 100vw, 573px\" \/><\/a><\/p>\n<p>The first thing I noticed about this email was that it was sent to about 100 different email addresses, all of which I could see in the &#8220;To:&#8221; line\u2014a warning sign of fraudulent intentions, especially for an email wanting me to verify my Apple ID intended for someone &#8220;trying to reset your password.&#8221; You can also see\u00a0in the email itself there are multiple grammatical\u00a0errors, copyright dates are expired, and it presents\u00a0a lame resemblance or what a valid email from Apple actually looks like.<\/p>\n<p>Although the sender claims to be Apple Inc, a quick check to find out who the email is really from reveals it&#8217;s not coming from Apple:<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/Phishing-Email-From-Apple-Inc.png\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-22259\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/Phishing-Email-From-Apple-Inc.png\" alt=\"Phishing email from &quot;Apple Inc&quot;\" width=\"252\" height=\"21\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/Phishing-Email-From-Apple-Inc.png 252w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/02\/Phishing-Email-From-Apple-Inc-150x12.png 150w\" sizes=\"(max-width: 252px) 100vw, 252px\" \/><\/a><\/p>\n<p>It failed\u00a0the\u00a0grammar\u00a0test and the &#8220;received from&#8221; test. And that&#8217;s all I needed to know before hitting the delete button.\u00a0But not all phishing attempts\u00a0are so easily identified.<\/p>\n<p>Other phishing attempts come to you in the form of\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-scam-alert-this-text-phishes-for-your-apple-id-password\/\" target=\"_blank\">text messages in attempt to steal for your Apple ID<\/a>\u00a0and password.\u00a0And some\u00a0scams may use both SMS messages and emails, attacking you from multiple channels hoping\u00a0to con you into believing this must be a valid attempt to save you in some way or another.<\/p>\n<p>Phishing scams typically\u00a0use\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/social-hacking\/\" target=\"_blank\">social hacking exploit techniques<\/a>\u00a0to trick you into giving up\u00a0your personal information. Sometimes they begin with pretexting:\u00a0The attacker will contact you under a pretext, perhaps based on a very real situation, such as the theft of your iPhone or iPad, designed to give you the impression that since they know what they already know, they must be authorized to know more. And sometimes it works. &#8220;Hook, line and sinker,&#8221; as they say.<\/p>\n<p>Take, for instance,\u00a0<a href=\"https:\/\/hackernoon.com\/this-is-what-apple-should-tell-you-when-you-lose-your-iphone-8f07cf73cf82#.r1zj0bcc7\" target=\"_blank\">Joonas Kiminki&#8217;s unfortunate tale of his stolen iPhone<\/a>. This happened merely weeks ago, and the result was\u00a0an active attempt to steal his identity\u2014specifically his Apple ID and password.\u00a0After\u00a0Joonas&#8217;s iPhone was stolen, he got a new phone and life went back to normal. However,\u00a0a\u00a0couple of\u00a0weeks later he received\u00a0an SMS and an email notifying him that his phone was found, and to simply visit a website and login to find the phone&#8217;s location. You can read his experience on\u00a0<a href=\"https:\/\/hackernoon.com\/this-is-what-apple-should-tell-you-when-you-lose-your-iphone-8f07cf73cf82#.r1zj0bcc7\" target=\"_blank\">his blog at Hackernoon.com<\/a>.<\/p>\n<p>Fortunately, he didn&#8217;t fall for the scam, but this is a\u00a0perfect example of the kinds of phishing attempts\u00a0we&#8217;re seeing this week.\u00a0Joonas cautioned why such scams would target your Apple ID, saying:<\/p>\n<blockquote>[Y]ou can\u2019t activate an iPhone (or any iOS device for that matter) as long as it\u2019s connected to someone\u2019s iCloud account. However, when you steal a phone, you can perfect the crime by stealing the poor bastard\u2019s identity as well. Then just log on to Find my iPhone, decouple the account from the device, and poof, you have an unlocked phone!<\/p><\/blockquote>\n<p>The moral of this story is that, if your phone is stolen, be aware that at some point in the near future\u00a0you could receive an email and even an\u00a0SMS message indicating that, surprise-surprise, your phone was &#8220;found,&#8221; and that you need to visit such-and-such website\u00a0and\u00a0enter your Apple ID credentials to view your iPhone&#8217;s location.<\/p>\n<p>An example of this type of phishing page popped up just hours ago, and it may even be\u00a0targeting Apple users whose iPhones were stolen:<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/AppleSupport\">@AppleSupport<\/a> <a href=\"https:\/\/twitter.com\/malwrhunterteam\">@malwrhunterteam<\/a> <a href=\"https:\/\/twitter.com\/JAMESWT_MHT\">@JAMESWT_MHT<\/a> <br \/>findmyiphone-location-map[.]com<br \/>Those &quot;tpyos&quot; will kill you<br \/>\ud83d\ude42 <a href=\"https:\/\/t.co\/DNMotqoLf9\">pic.twitter.com\/DNMotqoLf9<\/a><\/p>\n<p>&mdash; ExecuteMalware (@executemalware) <a href=\"https:\/\/twitter.com\/executemalware\/status\/761562636014223360\">August 5, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>How to protect yourself from phishing scams<\/h3>\n<p>There are many ways to protect yourself from phishing scams. Here are five\u00a0of the best methods\u00a0to protect your data and avoid getting duped:<\/p>\n<ol>\n<li>Stay aware of the types of websites you&#8217;re visiting and who you receive emails from, and double check the validity of a\u00a0site before you enter any personal information.<\/li>\n<li>Ensure that your iPhone and iPad has its passcode enabled, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-9-boost-passcode-security\/\" target=\"_blank\">preferably a six digit passcode<\/a>, available on Apple devices running iOS 9, which makes it even harder to crack.<\/li>\n<li>You may even wish to enable the\u00a0&#8220;Erase Data&#8221; passcode setting on your iPhone or iPad, which ensures that your device\u00a0erases all data on it after 10 failed passcode attempts. (Just be sure to also\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/cloud-storage-comparison-icloud-drive-vs-dropbox-vs-google-drive-vs-onedrive\/\" target=\"_blank\">backup your data to a cloud service provider<\/a>, such as iCloud Drive, so if you lose your phone\u00a0you can easily retrieve\u00a0the data on it.)<\/li>\n<li>Add another layer of protection by\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-activate-apple-two-step-verification-for-icloud\/\" target=\"_blank\">enabling two-factor authentication\u00a0for your Apple ID<\/a>.<\/li>\n<li>Last but not least, some very sound advice from Joonas Kiminki: &#8220;If you ever lose your iPhone, iPad or iPod, be extra alert for upcoming identity theft attempts.&#8221;<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Apple users need to be aware of an ongoing\u00a0phishing campaign that appears to be ramping up efforts the past couple days. Scammers have\u00a0found\u00a0a clever way to generate phishing websites\u2014and they&#8217;re after your Apple ID and password. What&#8217;s happening is an active\u00a0phishing campaign\u00a0by way of fake Apple websites attempting to slurp up as many Apple IDs [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":55321,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,151,5],"tags":[679,102,116],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple users need to be aware of an ongoing\u00a0phishing campaign that appears to be ramping up efforts the past couple days. Scammers have\u00a0found\u00a0a clever way\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Clever Phishing Scam Targets Your Apple ID and Password - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple users need to be aware of an ongoing\u00a0phishing campaign that appears to be ramping up efforts the past couple days. Scammers have\u00a0found\u00a0a clever way\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-05T19:32:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-08-25T17:50:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-site-appleid-password-scam.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-site-appleid-password-scam.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-site-appleid-password-scam.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/\",\"name\":\"Clever Phishing Scam Targets Your Apple ID and Password - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#primaryimage\"},\"datePublished\":\"2016-08-05T19:32:30+00:00\",\"dateModified\":\"2016-08-25T17:50:38+00:00\",\"description\":\"Apple users need to be aware of an ongoing\\u00a0phishing campaign that appears to be ramping up efforts the past couple days. Scammers have\\u00a0found\\u00a0a clever way\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Clever Phishing Scam Targets Your Apple ID and Password\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Clever Phishing Scam Targets Your Apple ID and Password\",\"datePublished\":\"2016-08-05T19:32:30+00:00\",\"dateModified\":\"2016-08-25T17:50:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#webpage\"},\"wordCount\":1245,\"commentCount\":7,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-site-appleid-password-scam.jpg\",\"keywords\":[\"Apple ID\",\"Phishing\",\"Scam\"],\"articleSection\":[\"Apple\",\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple users need to be aware of an ongoing\u00a0phishing campaign that appears to be ramping up efforts the past couple days. Scammers have\u00a0found\u00a0a clever way","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/","og_locale":"en_US","og_type":"article","og_title":"Clever Phishing Scam Targets Your Apple ID and Password - The Mac Security Blog","og_description":"Apple users need to be aware of an ongoing\u00a0phishing campaign that appears to be ramping up efforts the past couple days. Scammers have\u00a0found\u00a0a clever way","og_url":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-08-05T19:32:30+00:00","article_modified_time":"2016-08-25T17:50:38+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-site-appleid-password-scam.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-site-appleid-password-scam.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-site-appleid-password-scam.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/","name":"Clever Phishing Scam Targets Your Apple ID and Password - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#primaryimage"},"datePublished":"2016-08-05T19:32:30+00:00","dateModified":"2016-08-25T17:50:38+00:00","description":"Apple users need to be aware of an ongoing\u00a0phishing campaign that appears to be ramping up efforts the past couple days. Scammers have\u00a0found\u00a0a clever way","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Clever Phishing Scam Targets Your Apple ID and Password"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Clever Phishing Scam Targets Your Apple ID and Password","datePublished":"2016-08-05T19:32:30+00:00","dateModified":"2016-08-25T17:50:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#webpage"},"wordCount":1245,"commentCount":7,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-site-appleid-password-scam.jpg","keywords":["Apple ID","Phishing","Scam"],"articleSection":["Apple","Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/clever-phishing-scam-targets-your-apple-id-and-password\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/08\/phishing-site-appleid-password-scam.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-5MX","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/22255"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=22255"}],"version-history":[{"count":19,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/22255\/revisions"}],"predecessor-version":[{"id":55249,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/22255\/revisions\/55249"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/55321"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=22255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=22255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=22255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}