Set as Homepage - Add to Favorites

九九视频精品全部免费播放-九九视频免费精品视频-九九视频在线观看视频6-九九视频这-九九线精品视频在线观看视频-九九影院

【??? ?? ?? ???】Apple users targeted by annoying 'Reset Password' attack

Some Apple users are ??? ?? ?? ???reportedly being targeted by a sophisticated attack, requesting them to hand over their Apple ID credentials over and over again.

According to KrebsonSecurity, the attack starts with unsuspecting Apple device owners getting dozens of system-level messages, prompting them to reset their Apple ID password. If that fails, a person pretending to be an Apple employee will call the victim and try to convince them into handing over their password.

SEE ALSO: Apple confirms dates for WWDC 2024

This is exactly what happened to entrepreneur Parth Patel, who described their experience on Twitter/X. First, all of Patel's Apple devices, including their iPhone, Watch, and MacBook, started displaying the "Reset Password" notifications. After Patel clicked "Don't Allow" to more than one hundred requests, the fake Apple Support called, spoofing the caller ID of Apple's official Apple Support line. The fraudster Apple employee actually knew a lot of Patel's real data, including email, address, and phone number, but they got their name wrong, which had confirmed Patel's suspicions that they were under attack.


You May Also Like

While the attack was ultimately unsuccessful in this example, it's easy to imagine it working. The victim might accidentally allow the password reset (mistakes are easy to happen when you have to click on something hundreds of times), or they could fall for the fairly convincing, fake Apple Support call.

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

Patel's example isn't isolated, either; KrebsonSecurity has details on a very similar attack that happened to a crypto hedge fund owner identified by his first name, Chris, as well as a security researcher identified as Ken. In Chris' example, the attack persisted for several days, and also ended with a fake Apple Support call.

How did the attackers know all the data needed to perform the attack, and how did they manage to send system-level alerts to the victims' phones? According to KrebsonSecurity, the hackers likely had to get a hold of the victim's email address and phone number, associated with their Apple ID. Then they used an Apple ID password reset form, that requires an email or phone number, alongside a CAPTCHA, to send the system-level, password reset prompts. They also likely used a website called PeopleDataLabs to get information on both the victim and Apple employees they impersonated.

But there could also be a bug in Apple's systems, which should in theory be designed not to allow someone to abuse the password reset form and send dozens of requests in a short period of time (Apple did not respond to KrebsonSecurity's request for comment).


Related Stories
  • I used the Apple Vision Pro on a flight to Costa Rica — and it was chaotic
  • Apple confirms dates for WWDC 2024
  • Apple, Google, and Meta are being investigated by the EU under new Big Tech regulation
  • Apple might finally let you freely customize Home Screen icons on iPhone
  • Vulnerability found in Apple's Silicon M-series chips – and it can't be patched

It appears that there's no easy or foolproof way to protect oneself from such an attack at this time, save from changing one's Apple ID credentials and tying them to a new number and email. It's hard to tell how widespread this attack is, but Apple users should be vigilant and triple-check the authenticity of any password reset request, even if it appears to come from Apple itself.


For on spammers and scammers, check out Mashable's series Scammed, where we help you navigate a connected world that’s out for your money, your information, or just your attention.

Topics Apple Cybersecurity

0.1217s , 9760.84375 kb

Copyright © 2025 Powered by 【??? ?? ?? ???】Apple users targeted by annoying 'Reset Password' attack,Data News Analysis  

Sitemap

Top 主站蜘蛛池模板: 亚洲日韩欧美一区二区在线 | 51福利国产在线观看午夜天堂 | 国产a在亚洲线播放 | 在线观看视频 | 免费看国产精品3a黄的视频 | 国产m3u8在线观看 | 97影院午夜午夜伦不卡 | 日韩精品一区二区三区中文字幕 | 五月丁香婷婷综合激情在线 | 国产一区二区三区精品专区 | 国语高清精品 | 国产激情a∨在线视频播放 国产激情自拍亚洲精品国产精品精 | 最新色国产精品精品视频 | 国产女女 | 亚洲欧美日韩国产综合在线看片 | 五十路熟女俱乐部 | 国产高清日本综合 | 最好看免费观看高清电影大全 | 亚洲人成电影网站国产精品 | 亚洲欧美日韩污在线观看 | 最近免费中文字幕大全免费版视频 | 免费看美女午夜大 | 国产在线视频 | 日本中文字幕精 | 小说区图片区 | 欧美精品亚洲精品日韩专区 | 亚洲免费视频一区二区 | 亚洲一区国产一区日韩一区 | 亚洲欧美日韩高清综合678 | 永久免费提 | 好吊妞国产欧美日韩免费观看 | 国产精品美女久 | 青青青国产爽爽视频免费观看 | 欧美日韩中文字幕日韩欧美 | 国产情侣真实露脸在线最新 | 网友自拍视频一区二区三区 | 国产日韩精品欧美一区喷水 | 九九九精品视频在线播放 | 欧美高清一区三 | 日本精品电影一区二区三区 | 在线欧美日韩亚洲国产一区 |