1.6 million Apple users are targeted by phishing attacks

1.6 million Apple users are targeted by phishing attacks

The number of phishing attacks targeting users of Mac computers, iOS-based mobile devices, and the associated web services ecosystem to lure them into fraudulent schemes has reached 1.6 million in the first half of 2019. This figure is around nine percent greater than the attacks experienced in the whole of 2018. The growing number of users of popular digital devices is clearly attracting more and more cybercriminals. This is one of key finding of Kaspersky’s Threats to Mac Users Report 2019.


While the volume of malicious software threatening users of macOS and the iOS mobile platform is much lower than that threating user of Windows and Android platforms, when it comes to phishing – a platform-agnostic cyberthreat – things are quite different. As they rely on social engineering, most phishing attacks have nothing to do with software. As Kaspersky’s recent research showed, the number of cases where users faced fraudulent web pages utilizing the Apple brand as a decoy has increased significantly in the first six months of the year, reaching 1.6 million. This figure is nine percent higher than during the whole of 2018, when Kaspersky security solutions prevented more than 1.49 million attempts to access Apple-themed phishing pages. The research is based on threat statistics voluntarily shared by users of Kaspersky Security Network – a global cloud infrastructure designed for immediate response to emerging cyber threats.

Among the most frequent fraud schemes are those designed to resemble the iCloud service interface and to steal credentials to Apple ID accounts. Links to such services usually come from spam emails which pose as emails from technical support. They often threaten to block user accounts should they not click the link.


Another widespread scheme is the use of scaremongering pages that try to convince the user that their computer is under serious security t ..

Support the originator by clicking the read the rest link below.