Cybercriminals are leveraging a deceptive tactic to bypass Apple iMessage‘s phishing protection, tricking users into reactivating disabled links in suspicious messages, Bleepingcomputer reports.
Apple’s iMessage automatically disables clickable links in messages from unknown senders to protect users from phishing attacks. However, Apple confirmed that this safeguard can be overridden if a user replies to the message or adds the sender to their contact list, inadvertently reactivating the links.
Source: BleepingComputer
Recent reports reveal a sharp increase in phishing texts designed to exploit this loophole. Messages often impersonate legitimate organizations, such as shipping companies or toll agencies, and instruct users to reply with a specific text like “Y” to unlock the links.
For instance, one phishing message reads:
“Please reply Y, then reopen the message to activate the link or copy it to your browser.”
This tactic exploits user familiarity with responding “Yes” or “No” to opt out of services or confirm appointments, making it more likely for victims to fall into the trap.
Risks for Mobile Users
Responding to these messages does more than reactivate harmful links. It also alerts cybercriminals that the recipient is an active and responsive target, increasing their exposure to future phishing attempts. Vulnerable groups, such as older adults and less tech-savvy individuals, are particularly at risk. Once the links are reactivated, victims may unknowingly provide sensitive information, including credit card details and personal data, which can be exploited for financial gain.
Users are strongly advised not to reply to messages from unknown senders with disabled links. Instead, verify the legitimacy of the communication by directly contacting the organization it claims to represent.
As smishing attacks become increasingly sophisticated, staying vigilant and understanding these tactics is essential for mobile security.
Bijay Pokharel
Related posts
Recent Posts
Subscribe
Cybersecurity Newsletter
You have Successfully Subscribed!
Sign up for cybersecurity newsletter and get latest news updates delivered straight to your inbox. You are also consenting to our Privacy Policy and Terms of Use.