Apple Users Become the Latest Targets of MFA Attacks

Apple MFA AttacksA new string of multi-factor authentication (MFA) attacks targeting the reset of Apple IDs seem to be popping up in a likely attempt to steal the victim’s digital identity and more.A recent post on Twitter/X from entrepreneur Parth Patel outlines his experience when his phone became inundated with requests to reset his Apple ID password  – to the tune of over 100.

Similar to the MFA fatigue attacks we’ve seen last year, this attack sought to use the same technique to get the victim to either answer “yes” to make the prompts stop, or to make a mistake and accidentally allow the password reset.

While this kind of attack may not seem mainstream enough to pay attention on terms of warning users about it, etc., it does demonstrate how the cyber crime economy is growing enough that threat actors are looking for ways to fit into the economy by establishing a niche victim set for them to go after – digital identity theft via Apple IDs.

These attacks aren’t unique as Krebs on Security covered this and another similar attack on an IT professional, demonstrating it’s more than a one-off experience.

What can be taken from this specific attack is something we teach in our new-school security awareness training. If something looks suspicious, vigilance should immediately go up, a slowing of the response should be the status quo, and meticulously disengage and report the attack. 

if something looks suspicious, vigilance should immediately go up, a slowing of the response should be the status quo, and meticulously either disengaging or responding (as in the case of the prompt bomb attacks, where you’d need to at least deny each attack prompt) to ensure malicious intentions aren’t enabled by the victim-user’s actions.

KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organizations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.

Free Phishing Security Test

Would your users fall for convincing phishing attacks? Take the first step now and find out before bad actors do. Plus, see how you stack up against your peers with phishing Industry Benchmarks. The Phish-prone percentage is usually higher than you expect and is great ammo to get budget.

PST ResultsHere's how it works:

  • Immediately start your test for up to 100 users (no need to talk to anyone)
  • Select from 20+ languages and customize the phishing test template based on your environment
  • Choose the landing page your users see after they click
  • Show users which red flags they missed, or a 404 page
  • Get a PDF emailed to you in 24 hours with your Phish-prone % and charts to share with management
  • See how your organization compares to others in your industry

Go Phishing Now!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

Subscribe to Our Blog

Comprehensive Anti-Phishing Guide

Get the latest about social engineering

Subscribe to CyberheistNews