Home News Apple Warns iPhone Users of New Scam Draining Bank Accounts Through Panic-Based Fraud
News

Apple Warns iPhone Users of New Scam Draining Bank Accounts Through Panic-Based Fraud

Apple has issued a global warning to iPhone users about a rapidly growing scam campaign that is targeting individuals’ bank accounts through psychological manipulation rather than technical hacking.

The scam has been reported across multiple regions, including the United States and Europe, and is designed to create panic so victims act without thinking. Instead of breaking into devices, attackers rely on social engineering—tricking users into voluntarily giving away sensitive information.

How the scam works

The attack typically begins with a convincing text message that appears to come from Apple or Apple Pay. These messages often claim there is suspicious activity on the user’s account, such as an unauthorized purchase or account lockout.

The message usually includes a phone number and urges the recipient to call immediately. When victims call, they are not connected to Apple Support, but instead to scammers posing as official representatives.

These fraudsters use urgency and fear to manipulate users. In some cases, victims have been persuaded to withdraw large sums of money. One reported incident involved a person nearly withdrawing $15,000 before a bank employee intervened.

What Apple will never do

Apple has clearly outlined behaviors it never uses when contacting users:

  • It will never ask users to log in through unfamiliar websites
  • It will never request passwords, device passcodes, or two-factor authentication codes
  • It will never ask users to approve login prompts they did not initiate
  • It will never request that security features like Two-Factor Authentication or Stolen Device Protection be disabled

Apple emphasizes that any request of this kind is a sign of fraud.

Warning signs of the scam

Security experts highlight several red flags users should watch for:

  • Unexpected messages about Apple Pay or account issues
  • Urgent demands to act immediately
  • Messages containing phone numbers to call
  • Requests for passwords or verification codes
  • Instructions to transfer money or withdraw cash
  • Pressure to visit suspicious websites mimicking Apple’s login pages

If a scammer gains trust, they may direct users to fake websites designed to steal Apple ID credentials.

How to stay safe

The safest response to any suspicious message is to ignore it. Users should never click links or call numbers included in unexpected messages.

Instead, they should manually check their Apple account activity through the official Apple website or device settings.

If contacted by someone claiming to be Apple Support, Apple advises immediately ending the call.

How to report scams

Apple provides dedicated channels for reporting fraud:

  • Suspicious emails can be forwarded to Apple’s phishing report email
  • Scam text messages should be screenshot and reported to the same address
  • Fraudulent FaceTime calls can also be documented and sent for investigation

Final takeaway

These scams are effective because they exploit urgency and fear rather than technical weaknesses. Staying calm, verifying information independently, and refusing pressure-based instructions remain the strongest defenses against these attacks.


1 Comment

  • This is a timely warning. Scams like these are becoming more convincing because they rely on panic rather than technical hacking. It’s important for users to verify any Apple-related alerts directly through official settings instead of responding to messages or calls. Awareness like this can prevent serious financial loss.

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles

News

Hack-for-Hire Espionage Campaign Targets Journalists with Advanced Phishing Across MENA

A sophisticated hack-for-hire cyber espionage campaign has been uncovered targeting journalists, activists,...

News

BlueHammer Zero-Day Gives Attackers Full Control of Windows Systems Without a Patch

A newly disclosed Windows zero-day vulnerability, known as “BlueHammer,” is raising serious...

News

Outdated Systems and Vulnerable Apps Leave Most Enterprises Exposed to Cyberattacks

A recent security analysis highlights a widespread problem in enterprise environments: many...

News

APT28 Turns Vulnerable Routers into a Global DNS Hijacking and Espionage Network

A Russia-linked cyber espionage group, widely tracked as APT28, has been connected...