How to protect your iPhone from the new "sophisticated" pirate attack
"Push Bombing" is threatening to expose the Apple ID passwords for users.
Despite advanced security parameters and routine software updates, cybercrime is more stealthy than ever. Actually, Mobile security threats account for Over 60% digital fraud, Reader's Digest reports. We were told to be wary of open WiFi networks, spy software and phishing attacks - but now iPhone users warn others of a new "sophisticated" pirate attack called "push bombing".
In relation: The retired FBI agent shares 4 ways to endanger you every day . AE0FCC31AE342FD3A1346EBB1F342FCB
Unlike phishing, where victims receive text messages or e-mails infected with malware, this new method targets iPhone users by asking them to reset their Apple ID password via unsolicited contextual notifications. Security experts have Nicknamed the password reset attack "Multi-Factor Authentication (MFA) Fatigue" or "Bombing", because the objective is to infiltrate users with as many notifications as possible before giving and clicking on "Authorize".
"In this scenario, the Apple devices of a target are forced to display dozens of guests at the system which prevent the devices from being used until the recipient replies" allow "or" do not authorize "With each prompt," explains KrebsonScurity.
After so many unsuccessful attempts, "the crooks then call the victim while usurping Apple support in the caller ID, claiming that the user's account is attacked and that the Apple support must" check "a punctual code ", by Krebssoncurity. Once this code is validated, hackers can reset the victim's Apple ID password, lock them and erase all of their Apple devices.
Technological entrepreneur and iphone owner Patel parth was a recent target of the pushing bomb. In a long thread on X, Patel shared his experience And how he was able to dissuade the pirate from accessing his phone and passwords.
"Last night, I was targeted for a sophisticated phishing attack on my Apple identifier," he wrote on X. "The attackers made a high effort on me, using the data Osint de People Data Labs and the usurpation of the identification of the caller. "
Patel said the crook knew his birthday, his email address, his telephone number, his current residence and his past personal addresses. Speaking on the phone, he prompted the pirate "to validate a ton of information". However, they were mistaken about the detail alone: his name.
Patel and its Appleid have survived unscathed, but this password reset pirate attack is only gaining popularity. However, there are things you can do to protect your iPhone and confidentiality.
For example, never click on the "authorize" button on the notification. Continue to select "do not leave" until the bad cybercriminal ends up abandoning. Another tip: iPhone users must Never trust outgoing calls .
"Take a moment to think about it. Why would Apple call you? When Apple has already called you before when you go through real legitimate technical difficulties? Never! Apple does not make outgoing calls to users without Apple The customer calls them first and requests a reminder, " Mashable explain.
If you think you have answered a usurped call, hang up immediately. Instead, look for the company number online and call them directly to confirm whether the call was legitimate.
As a last case scenario, you can change the phone number associated with your Apple ID. However, Mashable warns that this could cause more headache because it will deactivate specific iPhone features like Imessage and FaceTime.
These pirate attacks generally never last a day, so do your best to wait for them. If notifications become uncontrollable, you can always visit your local Apple store, where a professional can help you better.