PayPal and Apple: Watch out, hackers are abusing Apple account notifications to distribute malware, steal money and data

PayPal and Apple: Watch out, hackers are abusing Apple account notifications to distribute malware, steal money and data

Scammers Exploit Apple’s Email Domain in Callback Phishing Attack

Cybercriminals have weaponized Apple’s email notification system to launch a callback phishing campaign, tricking victims into revealing sensitive data or granting remote access to their devices. The attack leverages emails sent from Apple’s legitimate email.apple.com domain, falsely alerting recipients of an $899 iPhone purchase made via PayPal. The message includes a phone number for victims to call to "cancel" the transaction a classic callback phishing tactic.

Once contacted, scammers manipulate victims into sharing personal information or installing remote access tools, enabling them to drain bank accounts or conduct fraudulent wire transfers.

The campaign’s novelty lies in its abuse of Apple’s account creation process. Scammers exploit the first and last name fields during Apple ID registration, which accept excessive characters, allowing them to embed an entire phishing message. By altering the account’s shipping details, they trigger a security alert email but instead of reaching the intended recipient, it lands in the scammer’s inbox. The attackers then distribute the fraudulent emails en masse using mailing lists, a technique previously seen with Google, Amazon, and Microsoft.

Apple’s systems were similarly abused in September 2023, when threat actors hijacked iCloud Calendar invites for phishing. While the method is not new, the use of a trusted domain like Apple’s amplifies the deception, making it harder for users to detect the scam.

The incident underscores the ongoing risk of phishing attacks leveraging reputable brands to bypass security filters and exploit human urgency.

Source: https://www.techradar.com/pro/security/watch-out-hackers-are-abusing-apple-account-notifications-to-distribute-malware-steal-money-and-data

Apple cybersecurity rating report: https://www.rankiteo.com/company/apple

PayPal cybersecurity rating report: https://www.rankiteo.com/company/paypal

"id": "APPPAY1776691669",
"linkid": "apple, paypal",
"type": "Cyber Attack",
"date": "9/2025",
"severity": "60",
"impact": "2",
"explanation": "Attack limited on finance or reputation"
{'affected_entities': [{'customers_affected': 'Unknown (mass distribution via '
                                              'mailing lists)',
                        'industry': 'Technology/Consumer Electronics',
                        'location': 'Global (U.S.-based)',
                        'name': 'Apple',
                        'size': 'Large Enterprise',
                        'type': 'Technology Company'}],
 'attack_vector': 'Email (Legitimate Domain Abuse)',
 'customer_advisories': 'Users should be cautious of unexpected purchase '
                        'alerts, avoid calling numbers provided in unsolicited '
                        'emails, and verify transactions through official '
                        'Apple or PayPal channels.',
 'data_breach': {'personally_identifiable_information': 'Yes (shared during '
                                                        'callback)',
                 'sensitivity_of_data': 'High (personally identifiable '
                                        'information)',
                 'type_of_data_compromised': 'Personal information (shared '
                                             'during callback)'},
 'description': 'Cybercriminals have weaponized Apple’s email notification '
                'system to launch a callback phishing campaign, tricking '
                'victims into revealing sensitive data or granting remote '
                'access to their devices. The attack leverages emails sent '
                'from Apple’s legitimate *email.apple.com* domain, falsely '
                'alerting recipients of an $899 iPhone purchase made via '
                'PayPal. The message includes a phone number for victims to '
                "call to 'cancel' the transaction—a classic callback phishing "
                'tactic. Once contacted, scammers manipulate victims into '
                'sharing personal information or installing remote access '
                'tools, enabling them to drain bank accounts or conduct '
                'fraudulent wire transfers.',
 'impact': {'brand_reputation_impact': 'Damage to Apple’s brand trust due to '
                                       'domain abuse',
            'data_compromised': 'Personal information (shared during callback)',
            'financial_loss': 'Potential fraudulent wire transfers and bank '
                              'account draining',
            'identity_theft_risk': 'High (personal information exposure)',
            'payment_information_risk': 'High (fraudulent transactions)',
            'systems_affected': "Victims' devices (via remote access tools)"},
 'initial_access_broker': {'entry_point': 'Apple’s account creation process '
                                          '(name fields) and security alert '
                                          'email system'},
 'lessons_learned': 'The incident highlights the risk of phishing attacks '
                    'leveraging trusted domains to bypass security filters and '
                    'exploit human urgency. Organizations must monitor and '
                    'restrict the misuse of their notification systems, and '
                    'users should verify unexpected purchase alerts through '
                    'official channels.',
 'motivation': 'Financial gain (fraudulent wire transfers, bank account '
               'draining)',
 'post_incident_analysis': {'corrective_actions': ['Enforce stricter '
                                                   'validation for account '
                                                   'creation fields.',
                                                   'Implement additional '
                                                   'verification steps for '
                                                   'security alert emails.',
                                                   'Monitor for unusual '
                                                   'patterns in security alert '
                                                   'emails.'],
                            'root_causes': ['Apple’s account creation process '
                                            'allowed excessive characters in '
                                            'name fields, enabling phishing '
                                            'message embedding.',
                                            'Security alert emails could be '
                                            'redirected to scammers by '
                                            'manipulating shipping details.',
                                            'Lack of additional verification '
                                            'for security alert emails.']},
 'recommendations': ['Apple should enforce stricter validation for account '
                     'creation fields (e.g., name length limits) to prevent '
                     'abuse.',
                     'Implement additional verification steps for security '
                     'alert emails to ensure they reach the intended '
                     'recipient.',
                     'Educate users on callback phishing tactics and the '
                     'importance of verifying unexpected purchase alerts '
                     'independently.',
                     'Monitor for unusual patterns in security alert emails '
                     '(e.g., mass distribution).',
                     'Collaborate with email security providers to detect and '
                     'block phishing campaigns abusing trusted domains.'],
 'references': [{'source': 'Cybersecurity News Outlets'}],
 'title': 'Scammers Exploit Apple’s Email Domain in Callback Phishing Attack',
 'type': 'Phishing (Callback Phishing)',
 'vulnerability_exploited': 'Exploitation of Apple’s account creation process '
                            '(excessive character acceptance in name fields) '
                            'and security alert email system'}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.