消失的鱼(几乎)
Gone (Almost) Phishin'

原始链接: https://ma.tt/2026/03/gone-almost-phishin/

一起复杂的网络钓鱼骗局险些骗取作者的Apple ID凭据。它始于所有设备上未经请求的密码重置提示,利用了苹果系统中的一个已知漏洞。关键在于,骗子随后*致电*苹果支持,冒充作者发起关于丢失手机和更改号码的合法案例——从而生成看似真实的电子邮件。 一位名为亚历山大的“支持代表”随后联系了作者,最初表现出令人印象深刻的知识和安全意识,建立了信任。他发送了一个链接,用于查看一个非常逼真的假冒苹果网站(audit-apple.com)上的“待处理请求”,该网站显示了真实的案例ID。然而,作者意识到该网站没有验证案例ID,从而将其暴露为一场精心策划的骗局。 骗子在被质问时立即挂断电话。作者强调了关键要点:忽略未经请求的密码重置提示,苹果*绝不会*主动联系,并且始终验证网址——合法的苹果支持只能在apple.com和getsupport.apple.com上找到。

黑客新闻 新的 | 过去的 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 消失的(几乎)钓鱼 (ma.tt) 11 分,由 luu 1小时前发布 | 隐藏 | 过去的 | 收藏 | 讨论 帮助 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请YC | 联系 搜索:
相关文章

原文

This is a little embarrassing to share, but I’d rather someone else be able to spot a dangerous scam before they fall for it. So, here goes.

One evening last month, my Apple Watch, iPhone, and Mac all lit up with a message prompting me to reset my password. This came out of nowhere; I hadn’t done anything to elicit it. I even had Lockdown Mode running on all my devices. It didn’t matter. Someone was spamming Apple’s legitimate password reset flow against my account—a technique Krebs documented back in 2024. I dismissed the prompts, but the stage was set.

What made the attack impressive was the next move: The scammers actually contacted Apple Support themselves, pretending to be me, and opened a real case claiming I’d lost my phone and needed to update my number. That generated a real case ID, and triggered real Apple emails to my inbox, properly signed, from Apple’s actual servers. These were legitimate; no filter on earth could have caught them.

Then “Alexander from Apple Support” called. He was calm, knowledgeable, and careful. His first moves were solid security advice: check your account, verify nothing’s changed, consider updating your password. He was so good that I actually thanked him for being excellent at his job.

That, of course, was when he moved into the next phase of the attack.

He texted me a link to review and cancel the “pending request.” The site, audit-apple.com, was a pixel-perfect Apple replica, and displayed the exact case ID from the real emails I’d just received. There was even a fake chat transcript of the scammers’ actual conversation with Apple, presented back to me as evidence of the attack against my account. At the bottom of the page was a Sign in with Apple button that he told me to use.

I started poking at the page and noticed I could enter any case ID and get the same result. Nothing was being validated. It was all theater.

“This is really good,” I told Alexander. “This is obviously phishing. So tell me about the scam.”

Silence. *Click*.

Once I’d suspected what was happening, I’d started recording the call, so I was able to save a good chunk of it, which Jamie Marsland used to make a video about the encounter. You can hear for yourself exactly how convincing “Alexander” was.

So let my almost-disaster help you avoid your own. Remember these rules.

  • Don’t approve any password-reset prompts—those are the first part of the attack. Do not pass Go, just head directly to your Apple ID settings. 
  • Apple will never call you first. 
  • When you get an email from Apple—or, really, anyone telling you to complete a digital security measure—check the URL they’re trying to send you to. Apple Support lives on apple.com and getsupport.apple.com, nowhere else.

After all, the best protection is knowing what this looks like before it happens.

Thank you to Peter Rubin and Jamie Marsland for putting this all together.

联系我们 contact @ memedata.com