消失的鱼(几乎)
Gone (Almost) Phishin'

原始链接: https://ma.tt/2026/03/gone-almost-phishin/

一起复杂的网络钓鱼骗局险些骗取作者的Apple ID凭据。它始于所有设备上未经请求的密码重置提示,利用了苹果系统中的一个已知漏洞。关键在于,骗子随后*致电*苹果支持,冒充作者发起关于丢失手机和更改号码的合法案例——从而生成看似真实的电子邮件。 一位名为亚历山大的“支持代表”随后联系了作者,最初表现出令人印象深刻的知识和安全意识,建立了信任。他发送了一个链接,用于查看一个非常逼真的假冒苹果网站(audit-apple.com)上的“待处理请求”,该网站显示了真实的案例ID。然而,作者意识到该网站没有验证案例ID,从而将其暴露为一场精心策划的骗局。 骗子在被质问时立即挂断电话。作者强调了关键要点:忽略未经请求的密码重置提示,苹果*绝不会*主动联系,并且始终验证网址——合法的苹果支持只能在apple.com和getsupport.apple.com上找到。

## 网络钓鱼诈骗变得更聪明 最近Hacker News上的讨论强调了网络钓鱼攻击日益复杂,特别是那些冒充Apple支持的攻击。诈骗者正在创建极其逼真的假网站,甚至使用令人信服的电话策略来窃取Apple ID,并可能窃取财务信息。 核心问题是,许多用户难以识别恶意URL,即使在建议他们仔细检查URL的情况下也是如此。人们常常依赖于识别熟悉的子字符串,例如“apple.com”,而没有理解域名从右到左的性质,这使得略微修改过的地址看起来很合法。向不太懂技术的个人,例如老年人,解释URL解析证明是无效的。 这个问题不仅仅限于Apple,微软和其他公司也为合法服务使用不一致的域名,进一步混淆了用户。专家建议,最好的防御方法是*始终*通过已知、受信任的来源直接导航到网站,而不是点击电子邮件或短信中的链接。密码管理器也提供了一层保护,拒绝在网络钓鱼网站上自动填充凭据。最终,提高用户教育和主要公司采用更好的安全措施对于对抗这些不断发展的威胁至关重要。
相关文章

原文

This is a little embarrassing to share, but I’d rather someone else be able to spot a dangerous scam before they fall for it. So, here goes.

One evening last month, my Apple Watch, iPhone, and Mac all lit up with a message prompting me to reset my password. This came out of nowhere; I hadn’t done anything to elicit it. I even had Lockdown Mode running on all my devices. It didn’t matter. Someone was spamming Apple’s legitimate password reset flow against my account—a technique Krebs documented back in 2024. I dismissed the prompts, but the stage was set.

What made the attack impressive was the next move: The scammers actually contacted Apple Support themselves, pretending to be me, and opened a real case claiming I’d lost my phone and needed to update my number. That generated a real case ID, and triggered real Apple emails to my inbox, properly signed, from Apple’s actual servers. These were legitimate; no filter on earth could have caught them.

Then “Alexander from Apple Support” called. He was calm, knowledgeable, and careful. His first moves were solid security advice: check your account, verify nothing’s changed, consider updating your password. He was so good that I actually thanked him for being excellent at his job.

That, of course, was when he moved into the next phase of the attack.

He texted me a link to review and cancel the “pending request.” The site, audit-apple.com, was a pixel-perfect Apple replica, and displayed the exact case ID from the real emails I’d just received. There was even a fake chat transcript of the scammers’ actual conversation with Apple, presented back to me as evidence of the attack against my account. At the bottom of the page was a Sign in with Apple button that he told me to use.

I started poking at the page and noticed I could enter any case ID and get the same result. Nothing was being validated. It was all theater.

“This is really good,” I told Alexander. “This is obviously phishing. So tell me about the scam.”

Silence. *Click*.

Once I’d suspected what was happening, I’d started recording the call, so I was able to save a good chunk of it, which Jamie Marsland used to make a video about the encounter. You can hear for yourself exactly how convincing “Alexander” was.

So let my almost-disaster help you avoid your own. Remember these rules.

  • Don’t approve any password-reset prompts—those are the first part of the attack. Do not pass Go, just head directly to your Apple ID settings. 
  • Apple will never call you first. 
  • When you get an email from Apple—or, really, anyone telling you to complete a digital security measure—check the URL they’re trying to send you to. Apple Support lives on apple.com and getsupport.apple.com, nowhere else.

After all, the best protection is knowing what this looks like before it happens.

Thank you to Peter Rubin and Jamie Marsland for putting this all together.

联系我们 contact @ memedata.com