Phishing emails, by which scammers and identity thieves attempt to lure you into either clicking on links contained within the email which download malware or trick you into providing personal information that will be used to make you a victim of identity theft, are nothing new. Β  They are a staple of identity thieves and scammers and with good reason because they work.
Reproduced below is a copy of an Apple phishing email, sent to me by a Scamicide reader that uses the common ploy of indicating that there is a security problem that requires you to verify personal information for security purposes. We have removed the Scamicide reader’s email address from the salutation line and replaced it with xs. Β  There are a number of telltale flaws in this particular phishing email. Β  Although the email address from which it was sent appears to be legitimate, upon closer examination you can determine it is not an official email address of Apple. As phishing emails go, this one is pretty good. It does not have glaring spelling or grammatical errors and it does manage to create a sense of emergency.
“π–―π—ˆπ—…π—‚π–Όπ—’ π–΅π—‚π—ˆπ—…π–Ίπ—π—‚π—ˆπ—‡
𝖨𝗆𝗆𝖾𝖽𝗂𝖺𝗍𝖾 π–Ίπ–Όπ—π—‚π—ˆπ—‡ π—‹π–Ύπ—Šπ—Žπ—‚π—‹π–Ύπ–½: π–Έπ—ˆπ—Žπ—‹ 𝖠𝗉𝗉𝗅𝖾 𝖨𝖣 π—‚π—Œ 𝖻𝖾𝗂𝗇𝗀 π—Œπ—Žπ—Œπ—‰π–Ύπ—‡π–½π–Ύπ–½
𝖣𝖾𝖺𝗋 xxxxxxxxxxxxx
𝖢𝖾 𝗁𝖺𝗏𝖾 𝗋𝖾𝖼𝖾𝗇𝗍𝗅𝗒 𝖽𝖾𝗍𝖾𝖼𝗍𝖾𝖽 𝗍𝗁𝖺𝗍 π—’π—ˆπ—Žπ—‹ 𝖠𝗉𝗉𝗅𝖾 𝖨𝖣 π—π–Ίπ—Œ 𝖻𝖾𝖾𝗇 𝗁𝖺𝗏𝗂𝗇𝗀 𝖺𝗇 π—‚π—Œπ—Œπ—Žπ–Ύ 𝗐𝗂𝗍𝗁 π—’π—ˆπ—Žπ—‹ 𝖻𝗂𝗅𝗅𝗂𝗇𝗀 π–Ίπ–Όπ–Όπ—ˆπ—Žπ—‡π—. 𝖢𝖾 𝖺𝗋𝖾 π—Žπ—‡π–Ίπ–»π—…π–Ύ π—π—ˆ 𝗏𝖾𝗋𝗂𝖿𝗒 𝗍𝗁𝖾 𝖻𝗂𝗅𝗅𝗂𝗇𝗀 π—‚π—‡π–Ώπ—ˆπ—‹π—†π–Ίπ—π—‚π—ˆπ—‡ π—’π—ˆπ—Ž π—‰π—‹π—ˆπ—π—‚π–½π–Ύπ–½. π–Έπ—ˆπ—Žπ—‹ 𝖠𝗉𝗉𝗅𝖾 𝖨𝖣 π—π–Ίπ—Œ 𝖻𝖾𝖾𝗇 π—Œπ—Žπ—Œπ—‰π–Ύπ—‡π–½π–Ύπ–½ 𝖺𝗇𝖽 𝖺 π—‡π—ˆπ—π—‚π–Ώπ—‚π–Όπ–Ίπ—π—‚π—ˆπ—‡ π—π–Ίπ—Œ 𝖻𝖾𝖾𝗇 π—Œπ–Ύπ—‡π— π—π—ˆ 𝗍𝗁𝖾 𝖑𝗂𝗅𝗅𝗂𝗇𝗀 π– π–Όπ–Όπ—ˆπ—Žπ—‡π— π—ˆπ—π—‡π–Ύπ—‹. π–―π—…π–Ύπ–Ίπ—Œπ–Ύ π—π—ˆπ—‹π—„ 𝗐𝗂𝗍𝗁 𝗍𝗁𝖾𝗆 𝗂𝗇 π—ˆπ—‹π–½π–Ύπ—‹ π—π—ˆ π—‹π–Ύπ—Œπ—ˆπ—…π—π–Ύ 𝗍𝗁𝖾 π—‚π—Œπ—Œπ—Žπ–Ύ.
𝖢𝖾 𝗐𝗂𝗅𝗅 𝖽𝖾𝗅𝖾𝗍𝖾 π—’π—ˆπ—Žπ—‹ 𝖠𝗉𝗉𝗅𝖾 𝖨𝖣 π—Žπ—‡π—…π–Ύπ—Œπ—Œ 𝗍𝗁𝖾 𝖻𝗂𝗅𝗅𝗂𝗇𝗀 π—ˆπ—π—‡π–Ύπ—‹ π–Όπ—ˆπ—‹π—‹π–Ύπ–Όπ—π—Œ 𝗍𝗁𝖾 π—π—‚π—ˆπ—…π–Ίπ—π—‚π—ˆπ—‡ 𝖻𝗒 𝖿𝗂𝗅𝗅𝗂𝗇𝗀 π—ˆπ—Žπ— 𝗍𝗁𝖾 π– π–Όπ–Όπ—ˆπ—Žπ—‡π— π–΅π–Ύπ—‹π—‚π–Ώπ—‚π–Όπ–Ίπ—π—‚π—ˆπ—‡ π–₯π—ˆπ—‹π—† 𝗐𝗂𝗍𝗁𝗂𝗇 𝗍𝗁𝗋𝖾𝖾 π–»π—Žπ—Œπ—‚π—‡π–Ύπ—Œπ—Œ π–½π–Ίπ—’π—Œ. π–³π—π—‚π—Œ π–Ώπ—ˆπ—‹π—† π—π–Ύπ—‹π—‚π–Ώπ—‚π–Ύπ—Œ π—’π—ˆπ—Žπ—‹ 𝗂𝖽𝖾𝗇𝗍𝗂𝗍𝗒 𝖺𝗇𝖽 π—ˆπ—π—‡π–Ύπ—‹π—Œπ—π—‚π—‰ π—ˆπ–Ώ 𝗍𝗁𝖾 𝗉𝖺𝗒𝗆𝖾𝗇𝗍 π—‚π—‡π—Œπ—π—‹π—Žπ—†π–Ύπ—‡π—. π–₯π–Ίπ—‚π—…π—Žπ—‹π–Ύ π—π—ˆ π—‰π—‹π—ˆπ—π—‚π–½π–Ύ 𝗍𝗁𝖾 π—‹π–Ύπ—Šπ—Žπ–Ύπ—Œπ—π–Ύπ–½ π–½π—ˆπ–Όπ—Žπ—†π–Ύπ—‡π—π—Œ 𝗆𝖺𝗒 π—‹π–Ύπ—Œπ—Žπ—…π— 𝗂𝗇 𝗉𝖾𝗋𝗆𝖺𝗇𝖾𝗇𝗍 π–Ίπ–Όπ–Όπ—ˆπ—Žπ—‡π— π–Όπ—…π—ˆπ—Œπ—Žπ—‹π–Ύ.
𝖒𝗅𝗂𝖼𝗄 π– π–Όπ–Όπ—ˆπ—Žπ—‡π— π–΅π–Ύπ—‹π—‚π–Ώπ—‚π–Όπ–Ίπ—π—‚π—ˆπ—‡ π–₯π—ˆπ—‹π—† π—π—ˆ 𝗍𝗁𝖾 π—‹π–Ύπ—Œπ—ˆπ—…π—π–Ύπ–½ π—‚π—Œπ—Œπ—Žπ–Ύ..
𝖠𝗉𝗉𝗅𝖾 π– π–Όπ–Όπ—ˆπ—Žπ—‡π— 𝖳𝖾𝖺𝗆”
Obviously if you do not have an account with Apple you know that this is a phishing scam, but even if you do have an account with Apple, as I indicated above there are a number of indications that this is not a legitimate email from Apple, but instead is a phishing email. Legitimate companies would refer to your specific account number in the email. Β They also would specifically direct the email to you by your name. Β This email’s salutation is addressed to the person’s email address.
As with all phishing emails, two things can happen if you click on the links provided.Β  Either you will be sent to a legitimate looking, but phony webpage where you will be prompted to input personal information that will be used to make you a victim of identity theft or, even worse, merely by clicking on the link, you may download keystroke logging malware that will steal all of your personal information from your computer or smartphone and use it to make you a victim of identity theft.Β  If you receive an email like this and think it may possibly be legitimate, merely contact Apple customer service where you can confirm that it is a scam.
If you are not a subscriber to and would like to receive daily emails with the Scam of the day, all you need to do is to go to the bottom of the initial page of and click on the tab that states “Sign up for this blog.”