Watch out for phishing attacks that can steal Apple ID passwords very hard to detect
Looking at the 2 images of the iCloud password asking iPhone users below, you can distinguish what is real, what is fake?
The screen requires entering iCloud password
At first glance, these two screens are identical, but the pop-up shown on the second picture is just a fake - a perfect attack is used to trick those who are not careful.
Felix Krause, the iOS developer and founder of Fastlane.Tools, describes a nearly undetectable phishing attack, explaining how iOS apps poisoned to steal Apple ID passwords to access iCloud accounts and personal data.
According to Krause's post, the iOS app only needs to use UIAlertController to display a fake dialog, mimicking the look and language that Apple uses. This makes it easier for hackers to persuade users to give Apple ID passwords without a doubt.
'iOS can ask users for iTunes passwords for a variety of reasons, most commonly updating iOS operating systems or applications. At that time, users often enter their Apple ID password without question, 'Krause said. 'However, these pop-ups are not only displayed on the lock screen, Home but also in the app, for example when accessing iCloud, Game Center or IAP'.
The app developer can also create fake alerts without knowing the user's email because sometimes Apple does the same as shown below.
Login without user email
Although there is no evidence of an attacker exploiting this trick, Krause says that it is easy to copy the system notification dialog, any standalone application can do it. For security reasons, he did not give the actual source of pop-ups when describing this attack.
This is how to prevent this type of smart phishing attack
Krause advises users to press the Home button when suspicious dialog boxes appear. If this operation closes the application and the dialog box is a scam. If both the dialog and the application are still there, that's true Apple.
'The reason is that the system dialog is running on another process, not part of the iOS app'.
Krause also recommends that users avoid entering information into any pop-ups, instead opening Settings and filling in them, as well as how users are encouraged not to click on the link received via email and then visit the website itself.
Even more important is the use of two-factor authentication, even when a password is available, the attacker does not get an OTP.
You should read it
- Differentiate Apple ID and iCloud
- Users can now manage iCloud passwords directly on Windows
- How to check the password of iCloud Keychain
- How to fix iCloud error requires login on iPhone and iPad
- iPhone keeps asking for iCloud password, how to fix it?
- iPhone forgot screen and iCloud password, how to get it back quickly
- How to recover forgotten iCloud, iTunes, Apple ID passwords on iPhone and iPad
- Forgot Apple ID password, how to quickly recover Apple ID password
May be interested
- Hack smartphone password via touch screen soundaccording to business insider, microphones in handheld devices can be used by malware to steal users' passwords and pins.
- How to ping Apple Watch from iPhonemany times, we put our apple watch somewhere and forget it. unlike traditional watches that are hard to find, fortunately, you can easily find your apple watch by pinging (ringing) it from your iphone or ipad.
- A research team has won a prize worth $ 100,000 for a new method of phishing detectionfacebook presented this year's internet defense prize to a group of researchers at the university of california - berkeley who have come up with a new way to detect phishing attacks in corporate networks. closely monitored.
- Hackers use banks as a starting point for phishing attacksthe cybercrime attacks banks and financial institutions entering and using a compromised infrastructure to have access to specific goals in every region or country that is trending. increase.
- India's largest IT services company is hit by a hacker 'the giant in the field of providing it services in the world's second most populous country, wipro ltd, based in bengaluru, karnataka, india, has become the latest name and also the most lucrative. join the list of businesses that are victims of phishing attacks in 2019.
- The 4 most popular network attacks towards older people in 2018a statistic has shown that in recent years, cyber attacks tend to focus more on older users.
- Excel continues to be used as a lure for online fraud with complex mechanismsthe popular tools and software used by microsoft have become the target of hackers to deploy online attacks many times.
- How to take screenshots on Apple Watchapple always makes it easy for users to take screenshots on iphone or ipad. and the apple watch is no exception. this is useful for many reasons, including writing apple watch user guides like this article!
- What to do if BIOS cannot detect ATA/SATA hard drive in Windows?it can be worrisome when the bios doesn't detect or recognize the ata/sata hard drive. worse yet, there are many causes of this problem, so it can be difficult to find the exact culprit that keeps the computer from detecting the hard drive.
- Learn about the Adversary-in-the-Middle phishing attack methodphishing attacks are extremely common right now. this method of cybercriminals can be very effective in stealing data and does not require a large amount of work at the grassroots level.