Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

698+ Articles
118+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Apple Account Change Alerts Abused to Send Phishing Emails
Apple Account Change Alerts Abused to Send Phishing Emails
NEWS

Apple Account Change Alerts Abused to Send Phishing Emails

Threat actors are exploiting Apple's legitimate account change notification system to embed fake iPhone purchase scams inside genuine Apple emails, bypassing spam filters and tricking victims out of thousands of dollars.

Dylan H.

News Desk

April 19, 2026
4 min read

A sophisticated phishing campaign is exploiting Apple's legitimate account change notification system to deliver fraudulent iPhone purchase scams inside genuine Apple emails — bypassing spam filters and dramatically increasing the credibility of the attack.

How the Attack Works

The campaign exploits a flaw in how Apple triggers account security notifications. Attackers modify a target account's shipping address to include a phishing message within the name or address fields. This change triggers Apple to send a legitimate security alert email to the account owner — and the phishing content is embedded directly in that notification.

The phishing message included within the alert claims the recipient has just purchased an iPhone 16 Pro for $899 via PayPal, and instructs them to call a provided phone number if they did not authorize the purchase. When victims call, they are socially engineered into surrendering:

  • Apple ID credentials
  • Payment card details
  • One-time verification codes (effectively handing over account access in real-time)

Why This Is Dangerous

Standard phishing campaigns must spoof the sender or use look-alike domains. This attack is different:

  • Email comes from Apple's real servers — sender authentication (DKIM, DMARC, SPF) all pass
  • No malicious links or attachments — nothing for URL scanners to flag
  • Bypasses most spam and anti-phishing filters — the email is, technically, a legitimate Apple notification
  • High perceived legitimacy — victims see a genuine Apple email format, correct logos, real Apple footers

Security researcher Brian Krebs and BleepingComputer both confirmed the technique: attackers are actively abusing Apple's real notification infrastructure, not spoofing it.

Reported Financial Impact

Victims have reported losses ranging from $500 to $5,000+, with some cases involving complete Apple account takeover within minutes of the phone call. Once attackers gain account access via stolen credentials and MFA codes, they can:

  • Lock the legitimate owner out of the account
  • Access iCloud data, photos, and documents
  • Make unauthorized purchases using stored payment methods
  • Use Find My to locate or remotely lock Apple devices

How to Recognize the Scam

Legitimate Apple communications follow these rules:

Apple WillApple Will Never
Send change alerts for account modificationsAsk you to call a phone number in an alert email
Include your name on file in communicationsRequest your password, MFA code, or payment details by phone
Link to apple.com for account actionsUse urgency tactics or claim unauthorized purchases

The presence of a phone number in an Apple notification email is an immediate red flag — Apple does not include callback numbers in automated security alerts.

Mitigation Steps

If you receive a suspicious Apple notification:

  1. Do not call any phone number listed in the email
  2. Navigate directly to appleid.apple.com (type it manually) to verify account activity
  3. Report the email to reportphishing@apple.com
  4. Change your Apple ID password if you suspect your account was modified

Proactive protections:

  • Enable two-factor authentication with a hardware security key if possible
  • Review your trusted phone numbers under Apple ID settings — remove any you don't recognize
  • Use an alias email for your Apple ID that is not publicly associated with your identity
  • Enable Advanced Data Protection on iCloud to limit what Apple (or attackers) can access

Reporting to Apple

Forward the suspicious email directly to:

reportphishing@apple.com

Include the full email headers if possible. Apple's security team uses these reports to identify and disrupt ongoing abuse of their notification infrastructure.

Broader Context

This attack technique — embedding phishing content in legitimate service notifications — is increasingly common. Similar campaigns have abused Google Calendar invites, PayPal invoice notifications, and Amazon shipping alerts. As email security controls improve, attackers are pivoting to legitimate sending infrastructure as a bypass method.

Organizations should train employees to be suspicious of any unexpected notification that includes a phone number to call — regardless of how legitimate the sending email address appears.


Source: BleepingComputer

#Phishing#Apple#Social Engineering#BleepingComputer

Related Articles

Traffic Violation Scams Switch to QR Codes in New Phishing Texts

Scammers are sending fake "Notice of Default" traffic violation SMS messages impersonating state courts across the U.S., pressuring recipients to scan a...

4 min read

Cybercriminals Target Accountants to Drain Russian Firms' Bank Accounts

Cybercriminals are stealing millions from Russian companies by compromising accountants' computers and disguising fraudulent transfers as routine salary...

5 min read

Drift $280M Crypto Theft Linked to 6-Month In-Person DPRK Infiltration

Drift Protocol has revealed that the $280 million hack it suffered was the culmination of a six-month long operation in which North Korean-linked threat...

5 min read
Back to all News