Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Education Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Your Apple ID Has Been Suspended—Or Has It?
Facebook   X   LinkedIn   Email

Your Apple ID Has Been Suspended—Or Has It?

May 21, 2025

In recent weeks, a new phishing scam emerged targeting Apple users, dubbed the "Apple ID suspended" scam. This latest scam employs a deceptive tactic to trick users into providing sensitive information, such as their valuable Apple login credentials and other personal details. For this one, it creates a sense of urgency and fear if the user doesn’t take action; a hallmark for these types of threats.

How the scam works

The tactics of this aren’t new to us. It typically manifests as an email that appears to be from Apple Support. It falsely claims that your Apple ID has been suspended due to "unusual activity" or outdated information.

The email often comes with an official-looking logo and professional wording designed to make you believe it’s legitimate. Typical for phishing. It also includes a blue button labeled “Go to Apple ID,” urging you to click it to verify your identity or reactivate your Apple ID. If you don’t act quickly—according to the email—you risk losing access to your account entirely within 24 hours. The aim is usually to make you panic so that you will take action without much thought.

Tell-tell signs

Here’s how you can spot this scam for what it is:

It asks for personal information via Email or Text. Apple never asks for this. Apple is clear about its policies: They will never ask you to provide account details, passwords, or payment information via email or text.

It comes from suspicious-looking email addresses. Scam messages often come from suspicious-looking addresses that closely resemble Apple's official email. For example, they may omit or include a single letter, or replace the “L” with a number “1.”

It contains generic greetings. Many scam emails start with "Dear Customer" instead of addressing you by name.

There are spelling and grammar mistakes. This is a giveaway for phishing. Apple prides itself on professionalism. If you spot odd language or typos, it’s a red flag.

What to do if you receive this message

If you receive an email claiming your Apple ID has been suspended, here are steps you should take to protect yourself:

Do Not Click Links. Avoid clicking any links in the email. Instead, hover over them to see the actual URL. If it doesn’t look like an official Apple website, do not click it. In fact, don’t click it at all. Go directly to Apple’s website to login.

Verify the Sender: Check the sender’s email address carefully. Legitimate emails from Apple will always come from an apple.com address.

Report the Email: If you suspect the email is a scam, forward it to Apple at reportphishing@apple.com. This helps Apple track and combat phishing attempts.

Change Your Password: If you have already clicked on a suspicious link and entered your information, change your Apple ID password immediately by going directly into your account from a trusted, preferably previously bookmarked link.

Enable Two-Factor Authentication (2FA): This adds an extra layer of security to your account. Even if a scammer obtains your password, they won’t be able to access your account without the second authentication step.

Stay Informed: Keep yourself updated on common scams and phishing tactics. Awareness is one of the best defenses against these types of attacks.


Overlays For Androids For Criminal Convenience

Mobile Security

Overlays For Androids For Criminal Convenience

Android Overlays are a powerful feature in the Android operating system. Theses allow apps to display content over other apps or over the system user interfaces. Ultimately this results in the user experience being more, well, user-friendly. So why is it important? This is useful in many ways, such as for displaying persistent notifications, those cheeky Android chat heads that float around the screen, or for using accessibility features. But those handy capabilities can also be misused by cybercriminals to create deceptive interfaces, tricking you. READ FULL STORY

Mac Users Targeted by Poseidon's Trident

Scams & Phishing

Mac Users Targeted by Poseidon's Trident

Mac users are in the crosshairs again. Recently, a new campaign distributing malware targeting them via malicious Google ads for the Arc browser was observed and reported by Malwarebytes. This is the second such instance in recent months, highlighting Arc's growing use in the Mac world. Cybercriminals are riding the Arc popularity wave and pointing their cyber-trident right at MacOS users. This latest campaign involves a macOS stealer, branded as "Poseidon." READ FULL STORY

Can Hackers Take A Bite Out Of  Your Mobile Pay Solution?

Mobile Security

Can Hackers Take A Bite Out Of Your Mobile Pay Solution?

With the many digital payment options available today, finding the most secure providers can be a challenge. The popularity of digital wallets has grown over time and writing checks and even using plastic cards for payments are quickly becoming the dinosaurs of our non-digital past. Many users now own mobile wallets and pay for goods and services. And using Apple Pay, Google Pay or another service for those transactions may offer peace of mind knowing your payment data is safe and out of the reach of hackers. READ FULL STORY

Bootleg Apple Software Hides Cryptomining Malware On Macs

Your Security

Bootleg Apple Software Hides Cryptomining Malware On Macs

For those keeping up with technology news, it’s not often Macs make hacking headlines. And for those who are simply Mac lovers, it’s not wise to think hacks happen only to Androids since both are vulnerable. A recent finding linking bootleg Apple software, malware, and cryptomining is a lesson all users can learn from. After all, a successful attack on Macs can end up targeting Androids, too. Security researchers at Jamf Threat Labs found a bootleg version of Final Cut Pro Apple software hiding cryptomining malware. READ FULL STORY

MFA Codes Bomb Your Apple Devices

Mobile Security

MFA Codes Bomb Your Apple Devices

You know that feeling when you’re busy and trying to focus on something and then BAM! You get a barrage of phone calls or emails, and it seems everyone is pulling you in one direction or the other. Attackers know we are often busy and are taking advantage. There is a current ongoing strategy that counts on you clicking away messages in a rush. In this case, you get bombarded with notifications that claim you need to reset your Apple ID password and “allowing” attackers to scam you. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...