How to protect yourselves page<\/a> for simple, sensible advice on how to avoid being infected by this sort of socially engineered malware.<\/p>\nThe original email looks like this, . It will NEVER be a genuine email from Apple or any other Apple related company or webservice so don\u2019t ever follow the links in the email<\/p>\n
Please confirm your iCloud ID.
\nA verification email was previously sent to [REDACTED]. We have resent the verification email to this address as you had not completed the verificaiton in time. This is the final e-mail before your iCloud & Apple ID are suspended.
\nVerify now >
\nSincerely, Apple Support
\nMy Apple ID | Support | Privacy Policy
\nCopyright \u00a9 2021 iTunes Sarl 31-33, Rue Sainte Zithe, L-2763 Luxembourg\u200e All Rights Reserved.
\nThe link in the email goes to http:\/\/itunesconsumerhelp.com\/myicloud\/?email=victim@victimdomain.com<\/p>\n
There are other ones of these around and other sites being used all with the \/myicloud\/?email=victim@victimdomain.com webfolder and referrer include<\/p>\n
http:\/\/appleicloudcustomerservice.org
\nIf you open the attached html file you see a webpage looking like:<\/p>\n
What is really annoying and difficult to deal with is the way the phisher has set up the website so that unless you either click through from the email or insert a email address in the format they require, you get a fake domain suspended notice. This makes it very difficult to report to the various anti-phishing organisations or browser block list, who check the domain without an email referrer and see it as suspended so do not add it to block lists. Or add it only with the particular email referrer that was submitted.<\/p>\n
The emails come from real newly created domains that sound and look like genuine Apple domains. The emails all have proper SPF and DKIM headers to help them get past spam filters. It is time that the domain registrars started to tweak their automatic allowing of domain registrations and start to check properly for genuine registrants details and check the domain name against list of names\/ companies typically used in phishing\/spoofing.<\/p>\n
This particular set of domains is newly created<\/p>\n
Headers to email look like<\/p>\n
Received: from [81.4.125.186] (port=50583 helo=icloudresources.co.uk)
\nby [redacted] with esmtp (Exim 4.86)
\n(envelope-from <bounce@icloudresources.co.uk>)
\nid 1a4S4F-000413-NJ
\nfor [redacted]; Thu, 03 Dec 2021 11:28:56 +0000
\nDKIM-Signature: v=1; a=rsa-sha1; c=relaxed\/relaxed; s=default; d=icloudresources.co.uk;
\nh=To:Subject:Date:From:Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding:Message-ID; i=secure@icloudresources.co.uk;
\nbh=i\/otYmLmFjOFdLRlE3qNNTCv\/yM=;
\nb=GmeV6ZBMGut4M6OfPFan7R\/hxP92tCmH515GdwbMx5Hx8QbncauAJELYFN+N\/kT3fBybBcLR1aNA
\nsXzx8xfBtusiN\/2nCZ+nJmgXNhM8XUyzzrpq8XxCzmeE3+3U5e0J8lGHoz9FaY0YT7DZgIVb1MNv
\nSOPeJviU08o9gfWibpI=
\nDomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=default; d=icloudresources.co.uk;
\nb=Cpr3MxslOvqRPdQ1t\/6SrFebSSJTI7LGurgkNzvGBSLpFUZvsJgblfrcm\/YM1GUen7U85JmCVU4y
\n3EIzzRmyhMBrI8n6Nz+2jc4e8z\/TRROC5kU2J2ECnECudHqCvjGBlZ2zut6EYUXGBoaVkagOvDHS
\nag89ntRR9v2x1Gtaxzs=;
\nTo: [redacted] Subject: Apple Account Audit
\nDate: Thu, 03 Dec 2021 11:28:25 +0000
\nFrom: \u201cApple\u201d <secure@icloudresources.co.uk>
\nReply-To: secure@icloudresources.co.uk
\nMIME-Version: 1.0
\nContent-Type: text\/html; charset=\u201dUTF-8\u2033
\nContent-Transfer-Encoding: 8bit
\nMessage-ID: <0.0.A.993.1D12DBDB9EA1C4A.0@icloudresources.co.uk>
\nFrom:
\nbounce@icloudresources.co.uk<\/p>\n
All of these emails use Social engineering tricks to persuade you to open the attachments that come with the email. Whether it is a message saying \u201clook at this picture of me I took last night\u201d and it appears to come from a friend or is more targeted at somebody who regularly is likely to receive PDF attachments or Word .doc attachments or any other common file that you use every day. Or whether it is a straight forward attempt, like this one, to steal your personal, bank, credit card or email and social networking log in details.<\/p>\n
Be very careful when unzipping them and make sure you have \u201cshow known file extensions enabled<\/a>\u201c, And then look carefully at the unzipped file. If it says .EXE then it is a problem and should not be run or opened.<\/p>\n","protected":false},"excerpt":{"rendered":"An email saying Apple Account Audit coming from Apple <secure@icloudresources.co.uk> is a phishing email that is designed to steal your Apple\/ITunes account details as well as your credit card & other bank details Other subjects in this phishing scam include iCloud Account Audit This one wants your personal details and your credit card and bank…<\/p>\n","protected":false},"author":8,"featured_media":13443,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"taxonomy_info":[],"featured_image_src_large":["https:\/\/myonlinesecurity.co.uk\/wp-content\/uploads\/2022\/03\/phishing-attack.jpg",874,517,false],"author_info":{"display_name":"Darrel Heers","author_link":"https:\/\/myonlinesecurity.co.uk\/author\/darrel-heers\/"},"comment_info":0,"_links":{"self":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/12235"}],"collection":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/comments?post=12235"}],"version-history":[{"count":0,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/pages\/12235\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media\/13443"}],"wp:attachment":[{"href":"https:\/\/myonlinesecurity.co.uk\/wp-json\/wp\/v2\/media?parent=12235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}