{"id":11718,"date":"2014-09-07T16:24:39","date_gmt":"2014-09-07T23:24:39","guid":{"rendered":"http:\/\/37prime.wordpress.com\/2014\/09\/07\/phishing-email-targets-icloud-users-stealing-password-credit-card-and-security-questions\/"},"modified":"2014-09-07T16:24:39","modified_gmt":"2014-09-07T23:24:39","slug":"phishing-email-targets-icloud-users-stealing-password-credit-card-and-security-questions","status":"publish","type":"post","link":"https:\/\/37prime.com\/news\/2014\/09\/07\/phishing-email-targets-icloud-users-stealing-password-credit-card-and-security-questions\/","title":{"rendered":"Phishing Email Targets iCloud Users, Stealing Password, Credit Card and Security Questions."},"content":{"rendered":"<p>The leaks of certain celebrities&#8217;s private photos on August 31, 2014\u00a0was purportedly stolen through iCloud.\u00a0<a href=\"http:\/\/www.apple.com\/pr\/library\/2014\/09\/02Apple-Media-Advisory.html\" target=\"_blank\">Apple released a statement<\/a>:<\/p>\n<blockquote>\n<p>After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet. None of the cases we have investigated has resulted from any breach in any of Apple\u2019s systems including iCloud\u00ae or Find my iPhone.<\/p>\n<\/blockquote>\n<p>On Sunday, September 7, 2014, we are receiving reports of Phishing email targeting iCloud users.<\/p>\n<p>All the images in the email\u00a0are\u00a0actually linked from Apple&#8217;s server. A common technique used in Phishing emails.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14442\" src=\"http:\/\/37prime.com\/news\/wp-content\/uploads\/2014\/09\/Phising-Email-Apple-iCloud.jpg\" alt=\"Phising-Email-Apple-iCloud\" width=\"1536\" height=\"2270\" \/><\/p>\n<p>Notice the address at the bottom of the Phishing email, it doesn&#8217;t even make any sense. Mixing up UK and US addresses.<\/p>\n<p>The link goes to icaresupportplus.com\/myicloud, designed to capture iCloud passwords from unsuspecting victims.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14437\" src=\"http:\/\/37prime.com\/news\/wp-content\/uploads\/2014\/09\/Phishing-icaresupportplus.org-slash-icloud.jpg\" alt=\"Phishing icaresupportplus.org slash icloud\" width=\"1324\" height=\"962\" \/>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14436\" src=\"http:\/\/37prime.com\/news\/wp-content\/uploads\/2014\/09\/Phisihing-icaresupportplus.org-SSL-Certificate.jpg\" alt=\"Phisihing icaresupportplus.org SSL Certificate\" width=\"536\" height=\"680\" \/><\/p>\n<p>After stealing iCloud user&#8217;s password, this rabbit hole goes deeper.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14441\" src=\"http:\/\/37prime.com\/news\/wp-content\/uploads\/2014\/09\/Phishing-Attack-iCloud-icaresupportplus.org-Forms.jpg\" alt=\"Phishing-Attack-iCloud-icaresupportplus.org-Forms\" width=\"1680\" height=\"2285\" \/><\/p>\n<p>It asks for personal informations including:<\/p>\n<p>Billing Address<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14444\" src=\"http:\/\/37prime.com\/news\/wp-content\/uploads\/2014\/09\/Phishing-Attack-iCloud-icaresupportplus.org-Address.jpg\" alt=\"Phishing-Attack-iCloud-icaresupportplus.org-Address\" width=\"960\" height=\"540\" \/><\/p>\n<p>Credit Card information<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14445\" src=\"http:\/\/37prime.com\/news\/wp-content\/uploads\/2014\/09\/Phishing-Attack-iCloud-icaresupportplus.org-Credit-Card.jpg\" alt=\"Phishing-Attack-iCloud-icaresupportplus.org-Credit-Card\" width=\"960\" height=\"540\" \/><\/p>\n<p>Security Questions, Date of Birth and Mobile Number<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14446\" src=\"http:\/\/37prime.com\/news\/wp-content\/uploads\/2014\/09\/Phishing-Attack-iCloud-icaresupportplus.org-Security-Questions.jpg\" alt=\"Phishing-Attack-iCloud-icaresupportplus.org-Security-Questions\" width=\"960\" height=\"540\" \/><\/p>\n<p>Whois information on icaresupportplus.org:<\/p>\n<blockquote>\n<p>Domain Name:ICARESUPPORTPLUS.ORG<br \/>Domain ID: D173863788-LROR<br \/>Creation Date: 2014-09-07T17:14:09Z<br \/>Updated Date: 2014-09-07T17:32:39Z<br \/>Registry Expiry Date: 2016-09-07T17:14:09Z<br \/>Sponsoring Registrar:Register.IT SPA (R124-LROR)<br \/>Sponsoring Registrar IANA ID: 168<br \/>WHOIS Server:<br \/>Referral URL:<br \/>Domain Status: clientDeleteProhibited<br \/>Domain Status: clientTransferProhibited<br \/>Domain Status: clientUpdateProhibited<br \/>Domain Status: serverTransferProhibited<br \/>Domain Status: addPeriod<br \/>Registrant ID:a5aa7c4caad3<br \/>Registrant Name:Andy Drummond<br \/>Registrant Organization:Andy Drummond<br \/>Registrant Street: 2 Heath Lane Cottages, Startley<br \/>Registrant City:Chippenham<br \/>Registrant State\/Province:Wiltshire<br \/>Registrant Postal Code:SN15 5HH<br \/>Registrant Country:GB<br \/>Registrant Phone:+44.7482992002<br \/>Registrant Phone Ext:<br \/>Registrant Fax:<br \/>Registrant Fax Ext:<br \/>Registrant Email:andydrummon@onlinesales.com<br \/>Admin ID:a5fc85e2fa64<br \/>Admin Name:Administrator Domain<br \/>Admin Organization:Namesco Limited<br \/>Admin Street: Acton House, Perdiswell Park<br \/>Admin City:Worcester<br \/>Admin State\/Province:England<br \/>Admin Postal Code:WR3 7GD<br \/>Admin Country:GB<br \/>Admin Phone:+44.8453633630<br \/>Admin Phone Ext:<br \/>Admin Fax:<br \/>Admin Fax Ext:<br \/>Admin Email:transfers-auth@names.co.uk<br \/>Tech ID:TC-a5fb9a8ae9<br \/>Tech Name:Namesco Limited<br \/>Tech Organization:Namesco Limited<br \/>Tech Street: Acton House, Perdiswell Park<br \/>Tech City:Worcester<br \/>Tech State\/Province:England<br \/>Tech Postal Code:WR3 7GD<br \/>Tech Country:GB<br \/>Tech Phone:+44.8453633630<br \/>Tech Phone Ext:<br \/>Tech Fax: +44.8453633631<br \/>Tech Fax Ext:<br \/>Tech Email:register.it@names.co.uk<br \/>Name Server:EMMA.NS.CLOUDFLARE.COM<br \/>Name Server:KANYE.NS.CLOUDFLARE.COM<br \/>Name Server:<br \/>Name Server:<br \/>Name Server:<br \/>Name Server:<br \/>Name Server:<br \/>Name Server:<br \/>Name Server:<br \/>Name Server:<br \/>Name Server:<br \/>Name Server:<br \/>Name Server:<br \/>DNSSEC:Unsigned<\/p>\n<p>Access to Public Interest Registry WHOIS information is provided to assist persons in determining the contents of a domain name registration record in the Public Interest Registry registry database. The data in this record is provided by Public Interest Registry for informational purposes only, and Public Interest Registry does not guarantee its accuracy. This service is intended only for query-based access. You agree that you will use this data only for lawful purposes and that, under no circumstances will you use this data to(a) allow, enable, or otherwise support the transmission by e-mail, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than the data recipient&#8217;s own existing customers; or (b) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator, a Registrar, or Afilias except as reasonably necessary to register domain names or modify existing registrations. All rights reserved. Public Interest Registry reserves the right to modify these terms at any time. By submitting this query, you agree to abide by this policy.<\/p>\n<\/blockquote>\n<p>The\u00a0phishing\u00a0email was purportedly sent from\u00a0<em>notice@icloudmaildirect.com<\/em>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-14443\" src=\"http:\/\/37prime.com\/news\/wp-content\/uploads\/2014\/09\/Phising-Email-Apple-iCloud-from-noticeaticloudmaildirectdotcom.jpg\" alt=\"Phising-Email-Apple-iCloud-from-noticeaticloudmaildirectdotcom\" width=\"1536\" height=\"864\" \/><\/p>\n<p>Whois information on icloudmaildirect.com:<\/p>\n<blockquote>\n<p>Whois Server Version 2.0<\/p>\n<p>Domain names in the .com and .net domains can now be registered<br \/>with many different competing registrars. Go to http:\/\/www.internic.net<br \/>for detailed information.<\/p>\n<p>Domain Name: ICLOUDMAILDIRECT.COM<br \/>Registrar: WEBFUSION LTD.<br \/>Whois Server: whois.123-reg.co.uk<br \/>Referral URL: http:\/\/www.123-reg.co.uk<br \/>Name Server: DARL.NS.CLOUDFLARE.COM<br \/>Name Server: MIA.NS.CLOUDFLARE.COM<br \/>Status: clientDeleteProhibited<br \/>Status: clientTransferProhibited<br \/>Status: clientUpdateProhibited<br \/>Updated Date: 07-sep-2014<br \/>Creation Date: 07-sep-2014<br \/>Expiration Date: 07-sep-2015<\/p>\n<p>&gt;&gt;&gt; Last update of whois database: Sun, 07 Sep 2014 21:55:37 UTC &lt;&lt;&lt;<\/p>\n<p>NOTICE: The expiration date displayed in this record is the date the<br \/>registrar&#8217;s sponsorship of the domain name registration in the registry is<br \/>currently set to expire. This date does not necessarily reflect the expiration<br \/>date of the domain name registrant&#8217;s agreement with the sponsoring<br \/>registrar. Users may consult the sponsoring registrar&#8217;s Whois database to<br \/>view the registrar&#8217;s reported date of expiration for this registration.<\/p>\n<p>TERMS OF USE: You are not authorized to access or query our Whois<br \/>database through the use of electronic processes that are high-volume and<br \/>automated except as reasonably necessary to register domain names or<br \/>modify existing registrations; the Data in VeriSign Global Registry<br \/>Services&#8217; (&#8220;VeriSign&#8221;) Whois database is provided by VeriSign for<br \/>information purposes only, and to assist persons in obtaining information<br \/>about or related to a domain name registration record. VeriSign does not<br \/>guarantee its accuracy. By submitting a Whois query, you agree to abide<br \/>by the following terms of use: You agree that you may use this Data only<br \/>for lawful purposes and that under no circumstances will you use this Data<br \/>to: (1) allow, enable, or otherwise support the transmission of mass<br \/>unsolicited, commercial advertising or solicitations via e-mail, telephone,<br \/>or facsimile; or (2) enable high volume, automated, electronic processes<br \/>that apply to VeriSign (or its computer systems). The compilation,<br \/>repackaging, dissemination or other use of this Data is expressly<br \/>prohibited without the prior written consent of VeriSign. You agree not to<br \/>use electronic processes that are automated and high-volume to access or<br \/>query the Whois database except as reasonably necessary to register<br \/>domain names or modify existing registrations. VeriSign reserves the right<br \/>to restrict your access to the Whois database in its sole discretion to ensure<br \/>operational stability. VeriSign may restrict or terminate your access to the<br \/>Whois database for failure to abide by these terms of use. VeriSign<br \/>reserves the right to modify these terms at any time.<\/p>\n<p>The Registry database contains ONLY .COM, .NET, .EDU domains and<br \/>Registrars.<br \/>Domain Name: ICLOUDMAILDIRECT.COM<br \/>Registry Domain ID:<br \/>Registrar WHOIS Server: whois.meshdigital.com<br \/>Registrar URL: http:\/\/www.domainbox.com<br \/>Updated Date: 2014-09-07T00:00:00Z<br \/>Creation Date: 2014-09-07T00:00:00Z<br \/>Registrar Registration Expiration Date: 2015-09-07T00:00:00Z<br \/>Registrar: WEBFUSION LIMITED<br \/>Registrar IANA ID: 1515<br \/>Registrar Abuse Contact Email: support@domainbox.com<br \/>Registrar Abuse Contact Phone: +1.8779770099<br \/>Reseller: 123Reg\/Webfusion<br \/>Domain Status: clientDeleteProhibited<br \/>Domain Status: clientUpdateProhibited<br \/>Domain Status: clientTransferProhibited<br \/>Registry Registrant ID:<br \/>Registrant Name: Jennifer Gibson<br \/>Registrant Organization: Jennifer Gibson<br \/>Registrant Street: High Juniper Cottage<br \/>Registrant City: Hexham<br \/>Registrant State\/Province: Hexham<br \/>Registrant Postal Code: NE46 1SN<br \/>Registrant Country: GB<br \/>Registrant Phone: +44.1434602641<br \/>Registrant Phone Ext:<br \/>Registrant Fax Ext:<br \/>Registrant Email: amaryllismacintyre@englandmail.com<br \/>Registry Admin ID:<br \/>Admin Name: Jennifer Gibson<br \/>Admin Organization: Jennifer Gibson<br \/>Admin Street: High Juniper Cottage<br \/>Admin City: Hexham<br \/>Admin State\/Province: Hexham<br \/>Admin Postal Code: NE46 1SN<br \/>Admin Country: GB<br \/>Admin Phone: +44.1434602641<br \/>Admin Phone Ext:<br \/>Admin Fax Ext:<br \/>Admin Email: amaryllismacintyre@englandmail.com<br \/>Registry Tech ID:<br \/>Tech Name: Webfusion Limited<br \/>Tech Organization:<br \/>Tech Street: 5 Roundwood Avenue<br \/>Tech City: Stockley Park<br \/>Tech State\/Province: Uxbridge<br \/>Tech Postal Code: UB11 1FF<br \/>Tech Country: GB<br \/>Tech Phone: +44.3454502310<br \/>Tech Phone Ext:<br \/>Tech Fax Ext:<br \/>Tech Email: yoursupportrequest@123-reg.co.uk<br \/>Name Server: darl.ns.cloudflare.com<br \/>Name Server: mia.ns.cloudflare.com<br \/>DNSSEC: unsigned<br \/>URL of the ICANN WHOIS Data Problem Reporting System: http:\/\/wdprs.internic.net\/<br \/>&gt;&gt;&gt; Last update of WHOIS database: 2014-09-07T22:55:44Z &lt;&lt;&lt;<\/p>\n<p>The Data in this WHOIS database is provided<br \/>for information purposes only, and is designed to assist persons in<br \/>obtaining information related to domain name registration records.<br \/>It&#8217;s accuracy is not guaranteed. By submitting a<br \/>WHOIS query, you agree that you will use this Data only for lawful<br \/>purposes and that, under no circumstances will you use this Data to:<br \/>(1) allow, enable, or otherwise support the transmission of mass<br \/>unsolicited, commercial advertising or solicitations via e-mail(spam);<br \/>or (2) enable high volume, automated, electronic processes that<br \/>apply to this WHOIS or any of its related systems. The provider of<br \/>this WHOIS reserves the right to modify these terms at any time.<br \/>By submitting this query, you agree to abide by this policy.<\/p>\n<p>LACK OF A DOMAIN RECORD IN THE WHOIS DATABASE DOES<br \/>NOT INDICATE DOMAIN AVAILABILITY.<\/p>\n<\/blockquote>\n<p>If you received this email, please\u00a0<a href=\"http:\/\/support.apple.com\/kb\/TS4019\" target=\"_blank\">forward the email as attachment<\/a>\u00a0to spam@icloud.com<\/p>\n<blockquote>\n<h4>OS X Mail<\/h4>\n<ol>\n<li>Open the message and choose \u201cForward as Attachment\u201d from the Message menu.<\/li>\n<li>Forward the message to iCloud\u00a0<a>spam@icloud.com<\/a>.<\/li>\n<li>Forward the message again to abuse@<em>domain<\/em>, replacing\u00a0<em>domain<\/em>\u00a0with the part of the sender&#8217;s email address after the @ symbol. For example, if the sender&#8217;s email address is spammer@spammydomain.com, forward the message to abuse@spammydomain.com.<\/li>\n<\/ol>\n<h4>Microsoft Outlook 2010 and Outlook 2013<\/h4>\n<ol>\n<li>Choose File &gt; Options.<\/li>\n<li>In the Options window, click Mail in the left-hand panel.<\/li>\n<li>In the<strong>\u00a0<\/strong>\u201cReplies and Forwards\u201d section, note the current setting so that you can change it back later. Then change the \u201cWhen forwarding a message\u201d setting to \u201cAttach original message\u201d.<\/li>\n<li>Click OK.<\/li>\n<li>Forward the message to iCloud\u00a0<a>spam@icloud.com<\/a>.<\/li>\n<li>Forward the message again to abuse@<em>domain<\/em>, replacing\u00a0<em>domain<\/em>\u00a0with the part of the sender&#8217;s email address after the @ symbol. For example, if the sender&#8217;s email address is spammer@spammydomain.com, forward the message to abuse@spammydomain.com.<\/li>\n<li>To return Outlook to your previous settings, repeat steps 1 to 4, but in step 3 change the \u201cWhen forwarding a message\u201d setting back to the way it was. If you don&#8217;t remember the setting, choose \u201cInclude original message text\u201d.<\/li>\n<\/ol>\n<h4>Microsoft Outlook 2007<\/h4>\n<ol>\n<li>Choose Tools &gt; Options.<\/li>\n<li>In the Options window, click Email Options in the Preferences tab.<\/li>\n<li>In the Email Options window, under \u201cOn replies and forwards,\u201d note the current setting so that you can change it back later. Then change the \u201cWhen forwarding a message\u201d setting to \u201cAttach original message\u201d.<\/li>\n<li>Click OK.<\/li>\n<li>Forward the message to iCloud\u00a0<a>spam@icloud.com<\/a>.<\/li>\n<li>Forward the message again to abuse@<em>domain<\/em>, replacing\u00a0<em>domain<\/em>\u00a0with the part of the sender&#8217;s email address after the @ symbol. For example, if the sender&#8217;s email address is spammer@spammydomain.com, forward the message to abuse@spammydomain.com.<\/li>\n<li>To return Outlook to your previous settings, repeat steps 1 to 4, but in step 3 change the \u201cWhen forwarding a message\u201d setting back to the way it was. If you don&#8217;t remember the setting, choose \u201cInclude original message text\u201d.<\/li>\n<\/ol>\n<\/blockquote>\n<p>Be safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The leaks of certain celebrities&#8217;s private photos on August 31, 2014\u00a0was purportedly stolen through iCloud.\u00a0Apple released a statement: After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/37prime.com\/news\/2014\/09\/07\/phishing-email-targets-icloud-users-stealing-password-credit-card-and-security-questions\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Phishing Email Targets iCloud Users, Stealing Password, Credit Card and Security Questions.&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[4],"tags":[],"class_list":["post-11718","post","type-post","status-publish","format-standard","hentry","category-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pcNtU-330","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/posts\/11718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/comments?post=11718"}],"version-history":[{"count":0,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/posts\/11718\/revisions"}],"wp:attachment":[{"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/media?parent=11718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/categories?post=11718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/37prime.com\/news\/wp-json\/wp\/v2\/tags?post=11718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}