{"id":22517,"date":"2018-05-29T03:38:55","date_gmt":"2018-05-29T07:38:55","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=22517"},"modified":"2019-11-15T06:36:50","modified_gmt":"2019-11-15T11:36:50","slug":"apple-gdpr-phishing","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/apple-gdpr-phishing\/22517\/","title":{"rendered":"GDPR bustle: Even scammers have new privacy policies"},"content":{"rendered":"<p>Recently, you\u2019ve probably been drowning in messages from every service you\u2019ve ever used informing of changes to privacy policies and the need to resubscribe to their newsletters in order to carry on receiving them.<\/p>\n<p>No, it\u2019s not an international flash mob of global companies \u2014 they\u2019re just trying to fall in line with the EU\u2019s new General Data Protection Regulation (GDPR), which came into force on May 25, 2018.<\/p>\n<p>The GDPR applies to all companies operating in the territory of the EU, and requires them to handle user data responsibly, which includes storing it securely, not transferring it to anyone without the users permission, and providing timely notifications about leaks in case they happen.<\/p>\n<p>What\u2019s more, companies do not have the right to send messages to users without their consent. That\u2019s why your mailbox is full of resubscription requests \u2014 services are keen to keep sending you stuff, but can\u2019t do so without that OK from you, which they are desperately trying to get.<\/p>\n<h3>GDPR fraud<\/h3>\n<p>Cybercriminals sniffed a perfect opportunity to make quite some user data out of this situation. After all, millions of people worldwide are blindly clicking \u201cYes, I agree\u201d in countless messages and entering personal info on multiple sites without a second thought.<\/p>\n<p>For example, we came across a mailshot seemingly on behalf of Apple menacingly informing recipients that their Apple ID is locked and set to be deleted in three days unless they fill out a form to confirm their account information.<\/p>\n<p>Apple is unable to confirm your billing details, the message said, and this allegedly violates the company\u2019s security policy. Your account is frozen and will be deleted within three days, continued the warning, unless you follow the link and enter your data.<\/p>\n<p>This, of course, has nothing to do with Apple. Just plain <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/phishing\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a>.<\/p>\n<p>The authors of the mailshot employed the oldest social engineering trick in the book: intimidation. Afraid of parting company with such a precious account, the less savvy user panics and acts rashly, entering data in places where it shouldn\u2019t. Such scams are as effective as they are numerous, i.e. very.<\/p>\n<div id=\"attachment_22522\" style=\"width: 983px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/29033819\/apple-gdpr-phishing-screen1.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-22522\" class=\"size-full wp-image-22522\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2018\/05\/29033819\/apple-gdpr-phishing-screen1.png\" alt=\"\" width=\"973\" height=\"670\"><\/a><p id=\"caption-attachment-22522\" class=\"wp-caption-text\">Example of a GDPR-related phishing email on behalf of Apple<\/p><\/div>\n<h3>How to spot phishing<\/h3>\n<p>If you keep a cool head, it\u2019s fairly easy to see that you\u2019re being phished. Let\u2019s take a closer look at this Apple ID-related message.<\/p>\n<p>In most cases, it\u2019s possible to determine that it\u2019s fraud even without opening it. For example, look at the sender\u2019s address in the <b><strong>From<\/strong><\/b> field and the topic in the <b><strong>Subject<\/strong><\/b> field (see screenshot). There is something obviously fake about a long email address containing generic words and a sequence of numbers, especially when you know that all legitimate messages about the Apple ID account come from appleid@id.apple.com.<\/p>\n<p>The message subject also contains strange numbers that don\u2019t make any sense. Spammers use them to create information noise and make the message look unique. Also pay attention to the <b><strong>RE<\/strong><\/b> tag, which means that the received message is a reply to a message that you sent. This is highly suspicious if you never wrote to this company (again, this is done to bypass spam filters).<\/p>\n<p>If the subject and sender\u2019s address aren\u2019t enough, an analysis of the message text should dispel all doubts. No self-respecting company in possession of your personal data will ever address you using your email address instead of your first and last names.<\/p>\n<p>Another way to recognize a fraudulent email is to look at the address of the link that you are being asked to follow. If you hover the mouse cursor over the text of the link, the address it points to will appear nearby or in the bottom-left corner of the browser window. It should not contain any strange domains or short links, such as bit.ly or similar.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n<h3>How to protect your data<\/h3>\n<ul>\n<li>Never enter personal data on suspicious sites. All actions involving personal data should be performed on official company websites.<\/li>\n<li>Before clicking on a link in a message and agreeing to provide personal information, make sure that the message is genuine. Check the sender\u2019s address, subject, and text for anything untoward. If something looks odd, don\u2019t click on anything. Contact the technical support team of the service in whose name the message was sent. They will help clarify the situation.<\/li>\n<li>Use a reliable security solution, such as <a href=\"https:\/\/www.kaspersky.com\/internet-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kismd___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a>, with anti-spam and anti-phishing components. It will sift out dubious messages and give warning of suspicious links.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>How scammers are exploiting the GDPR fuss to extract personal data.<\/p>\n","protected":false},"author":2481,"featured_media":22518,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2683],"tags":[14,2013,2951,363,76,726,240,422],"class_list":{"0":"post-22517","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-apple","9":"tag-gdpr","10":"tag-mailings","11":"tag-personal-data","12":"tag-phishing","13":"tag-scam","14":"tag-spam","15":"tag-threats"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/apple-gdpr-phishing\/22517\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/apple-gdpr-phishing\/13413\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/apple-gdpr-phishing\/11189\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/apple-gdpr-phishing\/15468\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/apple-gdpr-phishing\/13734\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/apple-gdpr-phishing\/15781\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/apple-gdpr-phishing\/20649\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/apple-gdpr-phishing\/10558\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/apple-gdpr-phishing\/10951\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/apple-gdpr-phishing\/9300\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/apple-gdpr-phishing\/16885\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/apple-gdpr-phishing\/16631\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/apple-gdpr-phishing\/20349\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/apple-gdpr-phishing\/20344\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/phishing\/","name":"phishing"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=22517"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22517\/revisions"}],"predecessor-version":[{"id":29717,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/22517\/revisions\/29717"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/22518"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=22517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=22517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=22517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}