iCloud is cloud storage officially offered to Apple users. 5 GB of storage space is free here. If you need more storage space for your data that you want to save/synchronize via Apple's, you can expand this for a fee. This can be done via the website www.icloud.com or apple.com/icloud , but also directly via the iCloud settings on the device used.

Apple Emails: Real and Fake iCloud Messages

Apple is currently officially announcing the shutdown of a specific service (“My Photo Stream”) within the cloud and is sending information and options for action to its customers via email.

This makes many users even more unsettled by fake emails that are intended to give the impression that they come from Apple.
The emails exist in different versions and pursue different goals. Most people claim that the cloud storage is full, the storage limit has been reached and it is necessary to increase the storage space. The memory limit has been reached. Some emails also claim that you can get another 50 GB for free if you are fast enough. The emails sometimes contain screenshots of real Apple messages or the iCloud logo.

Examples of fake Apple news
Examples of fake Apple messages / screenshots: polizei-praevention.de

Phishing and subscription traps

If you follow the link in the emails, you will be redirected to fake websites. This is where access data is collected, address and credit card data is collected, or subscription traps lurk.

The insidious thing about it: You can't always immediately tell from the sender email address or the address line in the browser that it's not an official message or website from Apple. The scammers behind these messages and sites rely on this being unchecked or simply overlooked. Web addresses are also often used that look real on small screens such as those on smartphones - as long as you don't look at the end of the address line.

MIMIKAMA
Fake website with phishing and subscription trap / Screenshot polizei-praevention.de

In addition to unauthorized payments and unwanted advertising, in the worst case scenario, the Apple account can also be used to access the devices and the data stored on them. If the perpetrators have gained control of the devices, in addition to the loss of data, blackmail is also conceivable.

Clicked, entered data – what now?

Anyone who has fallen victim to this scam and has entered their access data should take the following measures:

  • If you recognize dubious messages and websites or abuse, create screenshots as evidence for possible later reporting.
  • Change your AppleID account details immediately on the official Apple website
  • additional security options (e.g. 2-factor authentication ).
  • Check which devices and contact details are officially stored in the account. If there are foreign or already decommissioned devices or unknown data, these should be removed.
  • Be careful if official confirmations suddenly appear on the display of an iPhone, for example, as a result of the previous scam, indicating that an unknown device has logged in. Do not click on “Allow” too quickly. The fraudsters may already be preparing for external access here. Cancel access by refusing!
  • If bank and credit card details are involved when entering various forms on the pages accessed, inform your bank or credit institution immediately. To be on the safe side, block your credit card and object to abusive debits. – To be on the safe side, check your account statements for irregularities in the near future.
  • File a report with your local police station or via the associated online watchdog. Please bring specific data, bank statements, screenshots, etc. with you. If ID data has been uploaded as an image file on the phishing pages, be sure to inform them when filing a complaint.

Conclusion

In general, be careful and do not carelessly click on links in messages that arrive unexpectedly. Even if a reputable company is pretended to be the sender, check the sender address or the web address of the page that is accessed via the email.

If you are actually an Apple user, compare emails you have already received to identify any suspicious differences.

Apple also provides information about security and phishing .

Source:

polizei-praevention.de

This might also be of interest:
Small house with small scratches, but a big catch
Instagram: Blue tick becomes a mass product
Fake email about EU funding worth 850,000 euros


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )