Phishers Target Apple Customers In New Attack

While OS X is targeted by a far fewer number of viruses than other operating systems, that's not stopping fraudsters from trying to hit Mac users with fraud.

2 Min Read

While OS X is targeted by a far fewer number of viruses than other operating systems, that's not stopping fraudsters from trying to hit Mac users with fraud.I found this attack, if Mac news site 9to5mac.com's sources are accurate, to be somewhat ironic. And maybe even a foreshadow of attacks to come.

Here's what's happened, according to the site's Phishing scam hits Mac users - stay safe only story:

"We received word this morning of what could be a brand new phishing attack that's in circulation at present - an email which purports to relate to a recent Apple retail transaction and asks for details of any recent orders. The email (image above) also carries a stuffed file. This contains an 'exe' file which will only launch on a Windows machine, as with all such phishing trips, be advised not to click on any attachments from sources you don't know/trust.

The email reads: "We recorded a payment request from 'Apple Inc.' to enable the charge of ,548.45 on your account." It then goes on to advise readers to click on the attachment in the email in the event they want the transaction stopped.

"

This begs the obvious question: Why would attackers bother to target Windows users with attacks citing a purchase with Apple? Obviously, they're trying to get Windows users to install the software, and trying to profit from the number of Windows users who also buy Apple products.

But these scammers could try to pick any ruse: credit cards, bank accounts, tax statements. They have done and will continue to try all of these, but phishing scam strikes me as new.

Which means fraudsters are taking the momentum behind Apple seriously. Which may mean more Trojans and keystroke loggers designed to infect OS X users could be on the way.

For security and technology observations throughout the day, consider following me on Twitter.

Read more about:

2009

About the Author(s)

George V. Hulme, Contributing Writer

An award winning writer and journalist, for more than 20 years George Hulme has written about business, technology, and IT security topics. He currently freelances for a wide range of publications, and is security blogger at InformationWeek.com.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights