NEWYou tin present perceive to Fox News articles!
A caller phishing scam is getting a batch of attraction due to the fact that it uses existent Apple Support tickets to instrumentality radical into giving up their accounts. Broadcom's Eric Moret shared however helium astir mislaid his full Apple relationship aft trusting what looked similar authoritative communication. He described the afloat acquisition successful a elaborate station connected Medium, wherever helium walked done the scam measurement by step.
This strategy stands retired due to the fact that the scammers relied connected Apple's ain enactment strategy to marque their messages look legitimate. They created an acquisition that felt polished and nonrecreational from the archetypal alert to the last telephone call. Here's however the scam unfolded.
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts, and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide - escaped erstwhile you articulation my CYBERGUY.COM newsletter
THE #1 GOOGLE SEARCH SCAM EVERYONE FALLS FOR

Scammers are exploiting existent Apple Support tickets to instrumentality users into handing implicit their accounts, experts warn. (Photo by STR/NurPhoto via Getty Images)
How the scam starts
Moret archetypal received a flood of alerts. These included two-factor authentication notifications that claimed idiosyncratic was trying to entree his iCloud account. Within minutes, helium got telephone calls from calm, adjuvant callers who claimed to beryllium Apple agents acceptable to hole the issue.
The twist is however convincing the full setup felt. The scammers were capable to exploit a flaw successful Apple's Support strategy that lets anyone make a genuine enactment summons without verification. They opened a existent Apple Support lawsuit successful his name, which triggered authoritative emails from an Apple domain. This built instant spot and lowered Moret's guard.
How scammers gained entree to the account
During a 25-minute call, the fake agents guided Moret done what they said would unafraid his account. They walked him done the steps to reset his iCloud password. They besides told him a nexus would travel truthful helium could adjacent the case.
That nexus took him to a fake tract called entreaty pome dot com. The leafage looked authoritative and claimed his relationship was being secured. It past told him to participate a six-digit codification sent by substance to decorativeness the process.
When Moret entered that code, the scammers got precisely what they needed to motion into his account.
He past got an alert that his Apple ID had been utilized to motion into a Mac mini helium did not own. That confirmed the takeover attempt. Even though the scammer connected the telephone said this was normal, helium trusted his instinct. He reset his password again, which kicked them retired and stopped the attack.
BEWARE FAKE CREDIT CARD ACCOUNT RESTRICTION SCAMS

A Broadcom enforcement says helium astir mislaid entree to his Apple ID aft trusting a fraudulent enactment telephone that looked legitimate. (Photo by Jakub Porzycki/NurPhoto via Getty Images)
How to support yourself from the Apple Support summons scam
This benignant of scam works due to the fact that it feels real. The messages look official, and the callers dependable trained. Still, you tin enactment safer by watching retired for signs that thing is off.
1) Verify enactment tickets wrong your Apple account
Scammers created a real-looking summons to marque the full acquisition look legitimate. You tin corroborate what's existent by checking straight with Apple. Sign successful astatine appleid.apple.com oregon unfastened the Apple Support app to presumption your caller cases. If the lawsuit fig isn't listed there, the connection is fake, adjacent if the email comes from an Apple domain.
2) Hang up and telephone Apple yourself
Never enactment connected a telephone that you did not initiate. Scammers trust connected agelong conversations to physique spot and unit you into speedy decisions. Hang up close distant and telephone Apple Support straight astatine 1-800-275-2273 oregon done the Support app. A existent cause volition rapidly corroborate whether thing is wrong.
3) Check your Apple ID instrumentality list
If thing feels off, look astatine the devices signed into your account. Go to Settings, pat your name and scroll to spot each devices linked to your Apple ID. Remove thing you don't recognize. This measurement tin halt attackers accelerated if they've managed to get in.
4) Never stock verification codes
No existent enactment cause volition ever inquire for your two-factor authentication codes. Treat immoderate petition for these codes arsenic a large warning.
5) Check each nexus carefully
Look intimately astatine URLs. Fake sites often adhd other words oregon alteration formatting to look real. Apple volition ne'er nonstop you to a tract similar entreaty pome dot com.
SCAMMERS ARE ABUSING ICLOUD CALENDAR TO SEND PHISHING EMAILS

Criminals are utilizing Apple’s ain enactment strategy to make existent lawsuit emails that physique mendacious assurance with victims. (Photo by Fairfax Media via Getty Images via Getty Images)
6) Use beardown antivirus software
Strong antivirus bundle tin spot unsafe links, unsafe sites, and fake enactment messages earlier you pat them. Anti-phishing tools are particularly important with scams similar this 1 since the attackers utilized a fake tract and existent summons emails to instrumentality victims.
The champion mode to safeguard yourself from malicious links that instal malware, perchance accessing your backstage information, is to person beardown antivirus bundle installed connected each your devices. This extortion tin besides alert you to phishing emails and ransomware scams, keeping your idiosyncratic accusation and integer assets safe.
Get my picks for the champion 2025 antivirus extortion winners for your Windows, Mac, Android & iOS devices at Cyberguy.com
7) Use a information removal service
Data brokers cod your telephone number, location address, email, and different details that scammers usage to personalize attacks. A information removal work tin hitch overmuch of that accusation from broker sites, which makes you a harder people for societal engineering attempts similar the 1 described successful this article.
While nary work tin warrant the implicit removal of your information from the internet, a information removal work is truly a astute choice. They aren't cheap, and neither is your privacy. These services bash each the enactment for you by actively monitoring and systematically erasing your idiosyncratic accusation from hundreds of websites. It's what gives maine bid of caput and has proven to beryllium the astir effectual mode to erase your idiosyncratic information from the internet. By limiting the accusation available, you trim the hazard of scammers cross-referencing information from breaches with accusation they mightiness find connected the acheronian web, making it harder for them to people you.
Check retired my apical picks for information removal services and get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web by visiting Cyberguy.com
Get a escaped scan to find retired if your idiosyncratic accusation is already retired connected the web: Cyberguy.com
8) Turn connected beardown multi-layer protection
Keep two-factor authentication (2FA) connected for each large account. This creates a obstruction that rapidly stops attackers.
9) Slow down earlier reacting
Scammers privation you to panic. Pause earlier you act. Trust your instinct erstwhile thing feels rushed oregon strange. A abbreviated hold could prevention your full account.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Kurt's cardinal takeaways
This scam shows however convincing criminals tin beryllium erstwhile they exploit existent systems. Even cautious users tin autumn for messages that look authoritative and calls that dependable professional. The champion defence is to enactment alert and instrumentality a infinitesimal earlier responding to thing unexpected. When you dilatory down, double-check enactment tickets, and ne'er stock verification codes, you marque yourself acold harder to fool. Adding layers similar antivirus extortion and information removal services besides gives you much power implicit what attackers tin access. These elemental habits tin halt adjacent the astir polished scams earlier they get to your accounts.
What would you bash if you got a enactment telephone that felt existent but didn't look right? Let america cognize by penning to america at Cyberguy.com
Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts, and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide - escaped erstwhile you articulation my CYBERGUY.COM newsletter
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.










English (CA) ·
English (US) ·
Spanish (MX) ·