Apple iTunes Customers Targeted By Phishers - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile // Mobile Devices
News
5/20/2008
04:53 PM
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple iTunes Customers Targeted By Phishers

Anyone paying any attention at all should be able to detect the difference between "kurvemageren.com" and "apple.com," security experts report.




(click image for larger view)

A screen shot of the fake Apple Store.

Having delivered consistently strong financial results over the past year, displaced Wal-Mart as the leading U.S. music retailer, stormed into the mobile phone market, and outperformed the rest of the computer industry, Apple has never looked more polished.

But Apple's success has a downside: There are now enough Apple customers to attract cybercriminals.

Phishers have begun using Apple's brand as bait. Communications security company Proofpoint has detected a phishing message that attempts to exploit Apple's name. A screen shot provided by Proofpoint shows a fake version of the Apple Store that has been set up to steal personal information.

"The bad guys have moved on from trying to take advantage of eBay or Citibank," said Andrew Lochart, VP of product marketing at Proofpoint. "I guess this means that Apple is now a top-tier Internet retailer. The bad guys are trying to use Apple's brand to commit identity theft."

Lochart acknowledged that the URL used in this phishing attack "is not the best attempt I've ever seen to obfuscate a malicious URL." Indeed, anyone paying any attention at all will detect the difference between "kurvemageren.com" and "apple.com."

If this phishing expedition fails to generate any response, those responsible may turn their attention back to more traditionally phished brands.

But don't count on it. Several years ago, Apple's small share of the PC market was seen as the major reason that malware writers didn't try to craft Apple-specific exploits. With Mac OS X now appearing on iPhones and Apple computers, and the proliferation of Apple's iTunes, QuickTime, and Safari software on both Mac OS X and Windows devices, scammers now have large pool of potential victims to target with Apple-oriented attacks.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

News
Becoming a Self-Taught Cybersecurity Pro
Jessica Davis, Senior Editor, Enterprise Apps,  6/9/2021
News
Ancestry's DevOps Strategy to Control Its CI/CD Pipeline
Joao-Pierre S. Ruth, Senior Writer,  6/4/2021
Slideshows
IT Leadership: 10 Ways to Unleash Enterprise Innovation
Lisa Morgan, Freelance Writer,  6/8/2021
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll