A resurgence of a deceptive Apple scam is targeting individuals by exploiting concerns about low iCloud storage. Apple’s cloud storage service serves as a crucial digital backup for iPhone users, safeguarding photos, documents, and other essential files from accidental loss. While iCloud simplifies device transitions, such as between an iPhone, iPad, or Mac, by consolidating data in one central location, its primary limitation lies in restricted storage capacity unless users opt for additional space by paying a fee.
Scammers are capitalizing on these storage limitations to deceive individuals into divulging personal and financial details under the guise of preventing account blockages due to full storage. Malwarebytes cybersecurity experts have observed a rise in fraudulent emails alleging insufficient storage capacity, aiming to manipulate users into upgrading their storage plan through deceptive links redirecting to counterfeit websites designed to extract sensitive information.
The fraudulent messages, purportedly from Apple, falsely claim that iCloud storage has been exceeded, ceasing file backups, and prompt users to enhance their storage plan via a link leading to a fraudulent website intended for data theft. Despite various iterations of this scam, their common objective is to coerce users into making a nominal payment to prevent deletion of files in their iCloud storage.
To enhance user safety, updated guidelines emphasize that Apple does not initiate unsolicited emails regarding iCloud storage issues. Authentic alerts about nearing storage capacity are displayed within device settings or official system notifications, rather than through unsolicited emails or texts with external links. Users are advised to directly access their storage status by navigating to Settings on their device.
Here are five safety protocols for protecting your iCloud account:
1. Utilize Apple’s official website or device settings to access your account.
2. Never disclose your password to anyone.
3. Verify links before clicking on them in unexpected messages or emails.
4. Employ up-to-date anti-malware software with web protection features activated.
5. Exercise caution when interacting with dubious websites or payment requests.
