Apple Pay phishing scam exploits trust and urgency
Apple Pay users across multiple regions are being targeted by a coordinated phishing operation that security researchers describe as more sophisticated than conventional digital fraud, exploiting trust in familiar branding and the pressure of urgent security warnings to extract sensitive payment credentials. The campaign blends carefully designed emails with follow-up phone calls, a hybrid tactic that has enabled attackers to bypass user scepticism and some automated security […] The article Apple Pay phishing scam exploits trust and urgency appeared first on Arabian Post.
Apple Pay users across multiple regions are being targeted by a coordinated phishing operation that security researchers describe as more sophisticated than conventional digital fraud, exploiting trust in familiar branding and the pressure of urgent security warnings to extract sensitive payment credentials. The campaign blends carefully designed emails with follow-up phone calls, a hybrid tactic that has enabled attackers to bypass user scepticism and some automated security filters.
Alerts circulated to users mimic official Apple communications, warning of suspicious activity, account suspension risks, or failed verification attempts linked to Apple Pay. The messages stand out from older scam attempts by using polished layouts, accurate branding elements, and language that mirrors legitimate security notifications. Instead of directing victims to click a single malicious link, the emails encourage them to contact a support number or await a call from an “Apple security representative”, shifting the interaction to a live conversation.
Cybersecurity analysts tracking the campaign say this approach reduces the likelihood that victims will scrutinise URLs or detect malicious redirects. During the phone call, attackers guide users through a scripted verification process, requesting Apple ID credentials, one-time passcodes, and in some cases full payment card details associated with Apple Pay. The criminals often claim the information is required to reverse unauthorised transactions or prevent account lockdown, increasing the pressure on users to comply quickly.
Apple Pay itself relies on tokenisation, device-level authentication, and secure enclaves to protect card data, meaning attackers cannot directly extract payment numbers from the service. However, by obtaining Apple ID credentials and verification codes, fraudsters can take control of accounts, add new devices, or authorise payments and subscriptions. In several documented cases, compromised accounts were used to make purchases, drain linked balances, or harvest additional personal data for resale.
Security firms note that the campaign reflects a broader shift in cybercrime towards social engineering rather than technical exploitation. Email gateways and spam filters have improved at detecting malicious links and attachments, pushing attackers to rely more on human interaction. Vishing, where phone calls are used to manipulate victims, adds a layer of credibility that many users still associate with legitimate customer support.
The emails involved are typically sent from domains that closely resemble legitimate Apple-related addresses or from compromised business mail servers, making them harder to flag. Caller ID spoofing is also used during follow-up calls, allowing attackers to display names or numbers that appear consistent with official support lines. This convergence of email compromise and telephony fraud has been observed in other financial scams, but its application to mobile payment ecosystems marks an escalation.
Industry experts say the campaign also capitalises on the growing dependence on digital wallets for everyday transactions. As Apple Pay becomes more embedded in retail, transport, and online services, the perceived impact of losing access to an account increases, making urgent security warnings more effective. Fraudsters appear to be timing messages to coincide with common payment periods, such as subscription renewals or travel bookings, to heighten plausibility.
Apple has repeatedly stated that it does not ask users to share passwords, verification codes, or full card details via email or phone, and that official communications direct customers to manage account issues through device settings or the company’s website. Despite this, attackers exploit gaps in user awareness, particularly among those less familiar with evolving scam techniques.
Law enforcement agencies and consumer protection bodies have warned that financial losses from phishing and vishing scams continue to rise globally, with mobile payment users an increasingly attractive target. Beyond immediate monetary damage, account takeovers can lead to identity theft, unauthorised access to cloud data, and long-term credit issues.
The article Apple Pay phishing scam exploits trust and urgency appeared first on Arabian Post.
What's Your Reaction?