Phishing texts trick Apple iMessage users into disabling protection – BleepingComputer
Microsoft: macOS bug lets hackers install malicious kernel driversUK domain registry Nominet confirms breach via Ivanti zero-dayStolen Path of Exile 2 admin account used to hack player accountsPhishing texts trick Apple iMessage users into disabling protectionOneBlood confirms personal data stolen in July ransomware attackCISA orders agencies to patch BeyondTrust bug exploited in attacksStolen Path of Exile 2 admin account used to hack player accountsMicrosoft: macOS bug lets hackers install malicious kernel driversHow to access the Dark Web using the Tor BrowserHow to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11How to use the Windows Registry EditorHow to backup and restore the Windows RegistryHow to start Windows in Safe ModeHow to remove a Trojan, Virus, Worm, or other MalwareHow to show hidden files in Windows 7How to see hidden files in WindowsRemove the Theonlinesearch.com Search RedirectRemove the Smartwebfinder.com Search RedirectHow to remove the PBlock+ adware browser extensionRemove the Toksearches.xyz Search RedirectRemove Security Tool and SecurityTool (Uninstall Guide)How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundoHow to remove Antivirus 2009 (Uninstall Instructions)How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKillerLocky Ransomware Information, Help Guide, and FAQCryptoLocker Ransomware Information Guide and FAQCryptorBit and HowDecrypt Information Guide and FAQCryptoDefense and How_Decrypt Ransomware Information Guide and FAQQualys BrowserCheckSTOPDecrypterAuroraDecrypterFilesLockerDecrypterAdwCleanerComboFixRKillJunkware Removal TooleLearningIT Certification CoursesGear + GadgetsSecurityBest VPNsHow to change IP addressAccess the dark web safelyBest VPN for YouTubeCybercriminals are exploiting a trick to turn off Apple iMessage’s built-in phishing protection for a text and trick users into re-enabling disabled phishing links.With so much of our daily activities done from our mobile devices, whether paying bills, shopping, or communicating with friends and colleagues, threat actors increasingly conduct smishing (SMS phishing) attacks against mobile numbers.To protect users from such attacks, Apple iMessage automatically disables links in messages received from unknown senders, whether that be an email address or phone number.However, Apple told BleepingComputer that if a user replies to that message or adds the sender to their contact list, the links will be enabled.Over the past couple of months, BleepingComputer has seen a surge in smishing attacks that attempt to trick users into replying to a text so that links are enabled again.As you can see below, a fake USPS shipping issue and a fake unpaid road toll text were sent from unknown senders, and iMessage automatically disabled the links.While neither of these phishing lures is new, we noticed that these smishing texts, and others seen recently, ask users to reply with “Y” to enable the link.”Please reply Y, then exit the text message, reopen the text message activation link, or copy the link to Safari browser to open it,” reads the smishing messages.Further research shows this tactic has been used over the past year, with a surge since the summer.As users have become used to typing STOP, Yes, or NO to confirm appointments or opt out of text messages, the threat actors are hoping this familiar act will lead the text recipient to reply to the text and enable the links.Doing so will enable the links again and turn off iMessage’s built-in phishing protection for this text.Even if a user doesn’t click on the now-enabled link, the act of replying tells the threat actor that they now have a target that responds to phishing texts, making them a bigger target.While most of our regular readers will be able to spot that these are phishing attacks, BleepingComputer was shown one of the above texts by an older family friend, who was unsure if it was legitimate.Unfortunately, these types of people are commonly the target of these types of phishing messages, leading them to enter their personal information, credit card information, or other details that the attackers then steal.If you receive a message whose links are disabled or from an unknown sender asking you to reply to the text, you are strongly advised not to do so.Instead, contact the company or organization directly to verify the text and ask if there is anything else you need to do.Apple fixes two zero-days used in attacks on Intel-based MacsMicrosoft: macOS bug lets hackers install malicious kernel driversBanshee stealer evades detection using Apple XProtect encryption algoCriminal IP: Bringing Real-Time Phishing Detection to Microsoft OutlookNew details reveal how hackers hijacked 35 Google Chrome extensionsNot a member yet? Register NowMicrosoft MFA outage blocking access to Microsoft 365 appsScammers file first — Get your IRS Identity Protection PIN nowFake LDAPNightmware exploit on GitHub spreads infostealer malwarePassword health-check overdue? Audit your Active Directory for freeSave IT time with self-service password resetsCynet Delivers 100% Protection and 100% Detection Visibility in 2024 MITRE ATT&CK EvaluationCriminal IP: Real-Time Phishing Protection for Outlook UsersProtecting Against Malicious Browser Extensions: The Complete GuideTerms of Use – Privacy Policy – Ethics Statement – Affiliate DisclosureCopyright @ 2003 – 2025 Bleeping Computer® LLC – All Rights ReservedNot a member yet? Register NowRead our posting guidelinese to learn what content is prohibited.