Apple accounts stolen from iPhone users with this simple trick

Apple accounts stolen from iPhone users with this simple trick
Apple accounts stolen from iPhone users with this simple trick

iPhone users are the main victims, receiving messages and calls. (Illustrative Image Infobae)

Apple users are in danger. A group of cybercriminals is carrying out an attack to steal accounts using phishing tactics and taking advantage of double authentication to enter the profile.

According to Brian Krebs, a cybersecurity journalist,

The hack combines social engineering techniques and is mainly affecting iPhone owners, who They are saturated with a large number of notifications so that they fall into the trap and give their information to the attackerswho even call them by phone.

The attack takes place in two phases.

In the first, users receive multiple requests to change their Apple ID password. These notifications, which appear legitimate at first glance, are actually part of a technique called “MFA Bombing” (Multi-Factor Authentication).

The idea behind this tactic is to overwhelm users with so many requests that, attackers hope, they end up accepting some out of error, fatigue, or because they truly believe Apple is communicating with them.

Criminals take advantage of users’ ignorance to ask them for passwords and secret codes. (Illustrative image Infobae)

If this first stage does not achieve its objective, cybercriminals take a more direct and personalized approach.

So the second is that Users will begin receiving calls from individuals presenting themselves as Apple employees reporting an alleged attack on the user’s accountrequesting security information, including the verification code sent via SMS, which would allow them full access to the victim’s Apple account.

A striking feature of this type of phishing is the abuse of the Apple ID two-factor authentication system.. This system is designed to be an additional layer of security, requiring both the password and a unique verification code, but in this case it becomes an excuse for criminals to contact the user and steal their account.

As it is a function that many users do not know how it works and that it is a secret code, attackers take advantage of it to deceive them.

iPhone users are the main victims, receiving messages and calls. (Illustrative Image Infobae)

However, Krebs comments that among the affected users there are people who have businesses in cryptocurrencies and security expertsso the victims can be anyone and the important thing is to understand how these types of attacks work.

The best way to avoid these types of threats is to be attentive to unexpected notifications or communications that supposedly come from Apple. The company, like no other, needs to require passwords or authentication codes. So this private information should never be shared and passwords should be changed periodically.

ESET, cybersecurity company, warns about the possible risks associated with these Apple glasses. In large part, the recommendations arise because the device has a new operating system and some applications have bugs.

The Vision Pro has a new operating system and therefore may be vulnerable to attacks. (MANZANA)

Exploiting vulnerabilities is one of the tricks used by criminals to spread threats such as Trojans and ransomware.

In the case of ransomware, the device will be inhibited from fully performing its functions and victims will have two options: contact Apple for help, since Vision does not have an interface that allows direct interaction with the operating system to reinstall it, or pay the ransom for the information.

But this last action is not recommended because whoever pays the ransom finances the group of cybercriminals and allows them to attack even more victims. In addition, the return of information is not assured.

In the case of infection with a Trojan, cybercriminals can have access to all the cameras and sensors available on the device, viewing and monitoring everything the victim sees.

 
For Latest Updates Follow us on Google News
 

-

PREV They create a cell phone that accompanies you while you drink beer: it is a classic, you play Snake and more news
NEXT This is the Internet connection you need if you are going to broadcast in Streaming