{"id":3607,"date":"2011-12-26T10:18:50","date_gmt":"2011-12-26T09:18:50","guid":{"rendered":"http:\/\/blog.intego.com\/?p=3607"},"modified":"2012-04-17T12:48:26","modified_gmt":"2012-04-17T12:48:26","slug":"beware-of-apple-billing-information-phishing-e-mails","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/","title":{"rendered":"Beware of &#8220;Apple Billing Information&#8221; Phishing E-mails"},"content":{"rendered":"<p>A vast phishing attack has broken out, beginning on or around Christmas day, with e-mails being sent with the subject &#8220;Apple update your Billing Information.&#8221; These well-crafted e-mails could fool many new Apple users, especially those who may have found an iPhone, iPod or iMac under their Christmas tree, and set up accounts with the iTunes Store or the Mac App Store for the first time. The messages claim to come from &#8220;appleid@id.apple.com.&#8221; Here&#8217;s what the content looks like:<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/12\/apple-phishing.jpg\"><img loading=\"lazy\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/12\/apple-phishing-600x454.jpg\" alt=\"\" title=\"apple-phishing\" width=\"600\" height=\"454\" \/><\/a><\/p>\n<p>If you click on the link in the message, you will be taken to a realistic looking sign-in page, then, after entering your Apple ID and password, you&#8217;ll be taken to a page asking you to update your account profile, notably entering your credit card information. Again, this page looks realistic, and many of the elements it contains are taken from Apple&#8217;s own web pages. <\/p>\n<p>So how do you know that this is a phishing e-mail? The first rule of thumb is to move your cursor over the link in the message and wait for a tooltip to pop up:<\/p>\n<p><center><br \/>\n<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/12\/apple-phishing2.jpg\"><img loading=\"lazy\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/12\/apple-phishing2.jpg\" alt=\"\" title=\"apple-phishing2\" width=\"464\" height=\"86\" \/><\/a><br \/>\n<\/center><\/p>\n<p>As you can see above, the URL that displays is not an apple.com address, but rather a numerical address (we&#8217;ve blurred the first part of the address). At the end of the address is a page called apple.htm, which could fool people, but that&#8217;s not what&#8217;s important. Always look at the part right after the http:\/\/ in the URL: if it&#8217;s not something.apple.com (it could be www.apple.com, store.apple.com, or something else), then it&#8217;s bogus. <\/p>\n<p>We hope you&#8217;ll be careful if you&#8217;re new to Macs and Apple products. We work hard to keep Mac and Apple users safe from the many dangers of the Internet. <\/p>\n<div class=\"blog-download\">\n<p class=\"button\"><a href=\"https:\/\/www.intego.com\/demo?blog2\">Download 30-day free trial<\/a><\/p>\n<h4><a href=\"https:\/\/www.intego.com\/demo?blog2\">Protect your Mac from malware<\/a><\/h4>\n<p><a href=\"https:\/\/www.intego.com\/demo?blog2\">Download a free 30-day trial version of VirusBarrier X6 and save $5<\/a><\/p>\n<div class=\"clear\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A vast phishing attack has broken out, beginning on or around Christmas day, with e-mails being sent with the subject &#8220;Apple update your Billing Information.&#8221; These well-crafted e-mails could fool many new Apple users, especially those who may have found an iPhone, iPod or iMac under their Christmas tree, and set up accounts with the iTunes Store or the Mac App Store for the first time.<\/p>\n","protected":false},"author":3,"featured_media":3480,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[102],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A vast phishing attack has broken out, beginning on or around Christmas day, with e-mails being sent with the subject &quot;Apple update your Billing Information.&quot; These well-crafted e-mails could fool many new Apple users, especially those who may have found an iPhone, iPod or iMac under their Christmas tree, and set up accounts with the iTunes Store or the Mac App Store for the first time.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware of &quot;Apple Billing Information&quot; Phishing E-mails  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A vast phishing attack has broken out, beginning on or around Christmas day, with e-mails being sent with the subject &quot;Apple update your Billing Information.&quot; These well-crafted e-mails could fool many new Apple users, especially those who may have found an iPhone, iPod or iMac under their Christmas tree, and set up accounts with the iTunes Store or the Mac App Store for the first time.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-12-26T09:18:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-04-17T12:48:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/Alert.png\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/Alert.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/Alert.png\",\"width\":\"128\",\"height\":\"128\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/\",\"name\":\"Beware of \\\"Apple Billing Information\\\" Phishing E-mails - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#primaryimage\"},\"datePublished\":\"2011-12-26T09:18:50+00:00\",\"dateModified\":\"2012-04-17T12:48:26+00:00\",\"description\":\"A vast phishing attack has broken out, beginning on or around Christmas day, with e-mails being sent with the subject \\\"Apple update your Billing Information.\\\" These well-crafted e-mails could fool many new Apple users, especially those who may have found an iPhone, iPod or iMac under their Christmas tree, and set up accounts with the iTunes Store or the Mac App Store for the first time.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beware of &#8220;Apple Billing Information&#8221; Phishing E-mails\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Beware of &#8220;Apple Billing Information&#8221; Phishing E-mails\",\"datePublished\":\"2011-12-26T09:18:50+00:00\",\"dateModified\":\"2012-04-17T12:48:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#webpage\"},\"wordCount\":321,\"commentCount\":6,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/Alert.png\",\"keywords\":[\"Phishing\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A vast phishing attack has broken out, beginning on or around Christmas day, with e-mails being sent with the subject \"Apple update your Billing Information.\" These well-crafted e-mails could fool many new Apple users, especially those who may have found an iPhone, iPod or iMac under their Christmas tree, and set up accounts with the iTunes Store or the Mac App Store for the first time.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/","og_locale":"en_US","og_type":"article","og_title":"Beware of \"Apple Billing Information\" Phishing E-mails  - The Mac Security Blog","og_description":"A vast phishing attack has broken out, beginning on or around Christmas day, with e-mails being sent with the subject \"Apple update your Billing Information.\" These well-crafted e-mails could fool many new Apple users, especially those who may have found an iPhone, iPod or iMac under their Christmas tree, and set up accounts with the iTunes Store or the Mac App Store for the first time.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-12-26T09:18:50+00:00","article_modified_time":"2012-04-17T12:48:26+00:00","og_image":[{"width":"128","height":"128","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/Alert.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/Alert.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/Alert.png","width":"128","height":"128"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/","name":"Beware of \"Apple Billing Information\" Phishing E-mails - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#primaryimage"},"datePublished":"2011-12-26T09:18:50+00:00","dateModified":"2012-04-17T12:48:26+00:00","description":"A vast phishing attack has broken out, beginning on or around Christmas day, with e-mails being sent with the subject \"Apple update your Billing Information.\" These well-crafted e-mails could fool many new Apple users, especially those who may have found an iPhone, iPod or iMac under their Christmas tree, and set up accounts with the iTunes Store or the Mac App Store for the first time.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Beware of &#8220;Apple Billing Information&#8221; Phishing E-mails"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Beware of &#8220;Apple Billing Information&#8221; Phishing E-mails","datePublished":"2011-12-26T09:18:50+00:00","dateModified":"2012-04-17T12:48:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#webpage"},"wordCount":321,"commentCount":6,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/Alert.png","keywords":["Phishing"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/beware-of-apple-billing-information-phishing-e-mails\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/Alert.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-Wb","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3607"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=3607"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3607\/revisions"}],"predecessor-version":[{"id":4467,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3607\/revisions\/4467"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/3480"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=3607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=3607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=3607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}