Following Apple’s recent unveiling of the company’s innovations, and specifically the launch of the iPhone 12, Kaspersky experts have uncovered dozens of suspicious ventures around the world claiming to have pre-ordered the new smartphone, according to Kaspersky’s statement. .
Websites often contain a “call to action” to allow the user to pay in advance or to leave some of their information. If the victim gets trapped, all the data and payments they share fall into the hands of the scammers.
POSSIBILITY TO PARTICIPATE IN THE CIDDETTA LOTTERY
In most scam attempts, users are not only offered a pre-order, but are also offered to participate in a lottery that promises to win a new iPhone. To participate in this lottery, the user must answer a few questions and then the user is directed to the next survey.
The victim of the scam is redirected to a page where a small payment is required for the services of the lottery sponsors. As a result of referrals, scammers collect large amounts of personal data and can also gain revenue from the traffic they generate.
IPHONE 12 BURST MESSAGE DETECTED
According to the statement, Kaspersky experts have discovered another method in popular messaging software. After the launch of the new device, the researchers detected a flurry of messages aimed at those who wanted to get the new version of the smartphone for free. In said method; The user is asked to forward those messages to 20 people or 5 groups to win, then click a link to select the color of the winning phone, actually to the phishing site. In this method, the targets of the attackers can be different. Methods such as subscribing to a paid service, accessing personal data or payment information, and forcing money transfers with various excuses are used. The main danger is that this type of mobile content is viral, i.e. shared heavily among users.
Commenting on Tatyana Sidorina, Kaspersky security researcher, we would like to remind users that pre-order messages should be checked from reliable sources. Suspicious links in messaging software and social networks should not be followed. ‘and suggested using a security solution based on a database of known phishing and spam sources.