<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Callback Phishing — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/callback-phishing/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 19 Apr 2026 16:03:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/callback-phishing/feed.xml" rel="self" type="application/rss+xml"/><item><title>Apple Account Notification Phishing Campaign</title><link>https://feed.craftedsignal.io/briefs/2026-04-apple-phishing/</link><pubDate>Sun, 19 Apr 2026 16:03:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-apple-phishing/</guid><description>A phishing campaign is abusing legitimate Apple account change notifications to deliver fake iPhone purchase scams, tricking users into calling malicious support numbers.</description><content:encoded><![CDATA[<p>A phishing campaign is underway that abuses Apple&rsquo;s account change notification system. Threat actors are inserting phishing messages into the first and last name fields of Apple ID accounts. By modifying the account&rsquo;s shipping information, they trigger legitimate Apple security alerts, which then embed the malicious message within the email body. The emails appear to originate from <a href="mailto:appleid@id.apple.com">appleid@id.apple.com</a> and pass SPF, DKIM, and DMARC checks, making them more likely to bypass spam filters. This campaign is designed to trick recipients into believing their accounts have been used for fraudulent purchases, scaring them into calling a scammer&rsquo;s &ldquo;support&rdquo; number.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker creates an Apple ID using a burner email address.</li>
<li>The attacker enters a phishing lure (e.g., &ldquo;Dear User 899 USD iPhone Purchase Via Pay-Pal To Cancel&rdquo;) split across the first and last name fields in the Apple ID profile, as these fields have character limits.</li>
<li>The attacker modifies the account&rsquo;s shipping information.</li>
<li>This triggers an Apple account profile change notification email.</li>
<li>Apple sends a legitimate security alert notifying the user of the change, embedding the attacker-controlled first and last name fields within the email body. The email originates from <a href="mailto:appleid@id.apple.com">appleid@id.apple.com</a>.</li>
<li>The recipient receives the email, which appears legitimate and contains a phishing message and a callback number (e.g., 18023530761).</li>
<li>The recipient, believing their account has been compromised, calls the provided number.</li>
<li>The scammers attempt to convince the victim that their account has been compromised and may instruct them to install remote access software or provide financial information to &ldquo;resolve&rdquo; the issue, leading to financial theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful attacks can lead to financial theft, malware deployment, or data theft. Victims who call the provided number are at risk of being coerced into providing sensitive information or installing remote access software, giving the attackers full control over their devices and accounts. The specific number of victims is currently unknown, but the campaign&rsquo;s use of legitimate Apple infrastructure increases its potential reach and impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting emails originating from Apple infrastructure (<a href="mailto:appleid@id.apple.com">appleid@id.apple.com</a>) containing suspicious phone numbers to your SIEM.</li>
<li>Monitor for emails originating from <code>appleid@id.apple.com</code> that contain phone numbers in the email body and consider blocking the identified number <code>18023530761</code>.</li>
<li>Educate users to treat unexpected account alerts claiming purchases or urging them to call support numbers with extreme caution, especially if they did not initiate any recent changes.</li>
<li>Review email gateway logs for emails originating from <code>appleid@id.apple.com</code> and <code>uatdsasadmin@email.apple.com</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>apple</category><category>phishing</category><category>callback phishing</category><category>email</category></item></channel></rss>