Apple device users beware – a new wave of phishing text scams has emerged that impersonate Apple to trick you into handing over personal information and money. Known as the “Apple Approval Notice” or “Apple Pay Verification” scam, these fraudulent messages leverage the Apple brand and claims of suspicious account activity to manipulate victims.
In this comprehensive article, we will peel back how this con works, analyzing the scam texts, social engineering tactics and end goals of these criminal operations. With thorough insight into their methods, we can better identify risks and protect ourselves moving forward. Don’t let scammers leverage our reliance on mobile devices against us.
Overview of the Scam
The Apple Approval Notice scam capitalizes on peoples’ reliance on mobile devices and the intimacy they provide to our digital lives. This gives fraudsters an open door to manipulate victims and exploit their accounts, contacts, and personal data.
It starts when a phishing text message is sent en masse to Apple device owners. The message is spoofed to look like it comes directly from Apple, often using Apple branding elements and naming conventions. The texts reference the recipient’s Apple ID and claim that a suspicious purchase or sign-in attempt was detected from their account.
Examples of these scam texts include:
“Apple Alert: We have detected a suspicious purchase of $412.38 made with your Apple ID at the App Store. If this was not authorized by you, please call Apple Support immediately at 833-246-5689.”
“Apple Approval Notice
We have noticed that your Apple iCloud id was recently used at “APPLE STORE – CA” for $143.95, paid by Apple Pay Pre Authorization. Also some suspicious sign in request and apple pay activation request detected. That looks like suspicious to us. In order to maintain the security and privacy of your account we have placed those request on hold. If NOT you? talk to an Apple Representative. Failing may lead to auto debit and charge will not be reversed. Call immediately to cancel this charge.”
“Apple Approval Notice: Your Apple ID was just used to purchase $629.99 in Apple Gift Cards on Apple.com. If this was not you, call 833-246-5689 immediately.”
The messages build a sense of urgency by posing as alerts directly from Apple security about potential account misuse. Terms like “suspicious activity,” “unauthorized purchase,” and “Apple Approval Notice” imply the recipient’s data or money is at risk if they don’t take action quickly.
By spoofing the origin of the texts and referencing real Apple products and services, it gives recipients a false sense of legitimacy. But the phone numbers provided connect to elaborate criminal call centers completely unrelated to Apple.
These scam call centers invest heavily in replicating the customer service experience of a legitimate support team. Operators pose as Apple support technicians using common naming conventions, verbal tics, and even spoofed caller ID. Their sole purpose is tricking recipients into providing remote access and control over their device.
Once granted this access, scammers have an open door to install spyware, steal passwords, access financial accounts, and harvest personal data. And victims are none the wiser as scammers pretend to be helping “resolve the security threat.”
It is critical to understand Apple’s policy is to never initiate unsolicited communication via text message, email, or phone call to warn users about account issues. Any such message is an obvious sign of a phishing attempt seeking access or information. Legitimate Apple support numbers are published on their website.
By impersonating Apple and claiming an account emergency, scammers manipulate worried victims into letting their guard down. But having insight into these deceptive tactics helps us identify risks and avoid being taken advantage of. Do not call random numbers texted from unknown sources. Instead verify account issues directly with Apple through official channels.
How the Apple Approval Notice Scam Works
Let’s break down the step-by-step process used by scammers to successfully manipulate victims with the Apple Approval Notice scam:
1. Victims Receive a Phishing Text
The scam starts with an SMS text sent to the victim’s mobile device. The message is spoofed to appear as if it comes directly from Apple. The text references the recipient’s “Apple ID” and claims an unauthorized purchase was made or attempted using Apple Pay or their account credentials.
Example phishing texts include:
- “Apple Alert: A purchase of $512.23 has been made on the iTunes Store with your Apple ID. If this was not you, call Apple Support immediately at 844-246-5547.”
- “Apple Approval Notice: Your Apple ID was just used to purchase an iPhone 13 Pro Max at Apple.com for $1599. If this was not you, call 844-246-5547 right away.”
The texts build urgency by posing as if sent directly from Apple, warning of account misuse. But it’s all an act by scammers hoping the victim calls back.
2. Recipients Call the Fake Apple Support Number
Spoofing the text to appear from Apple, referencing real products and services, and creating urgency with supposed unauthorized access gets recipients to lower their guard and call back.
But the phone numbers in the texts actually route to sophisticated criminal call centers completely unaffiliated with Apple. Scammers go to great lengths to appear as legitimate Apple support technicians.
3. Scammers Gain Remote Access to the Victim’s Device
Once scammers have the victim on the phone, their goal is ultimately to gain remote access to the device. Posing as Apple support agents, they claim remote access is needed to diagnose and resolve the security threat mentioned in the scam text.
Common methods for gaining access include:
- Walking victims through installing remote desktop apps like AnyDesk
- Directing victims to an iCloud phishing page to enter their Apple ID login credentials
- Leveraging built-in Apple screen sharing tools
Victims who allow remote access inadvertently give scammers an open door to steal their personal data and spy on activity.
4. Criminals Exploit Their Control Over the Device
With open access to a victim’s device, the possibilities for exploitation are endless. Common criminal activities include:
- Installing spyware apps to harvest data in the background
- Stealing iCloud credentials for persistent account access
- Monitoring emails and texts for sensitive info like online banking passwords
- Making fraudulent purchases with saved payment methods
- Demanding gift cards or cryptocurrency, claiming it will “protect assets”
Scammers will use their control to exploit anything of value, from personal data to financial accounts, with victims none the wiser.
What to Do If You Get an Apple Approval Notice Scam Text
If you receive a suspicious text claiming to be from Apple warning about unauthorized access or purchases, avoid calling the number given. Instead:
1. Avoid Calling Any Number Provided
It can be alarming to get an urgent scam message allegedly from a reputable company like Apple. The natural reaction is to want to call to resolve the supposed issue. However, any number provided in an unsolicited text like this is extremely likely to be fraudulent. Calling puts you directly in touch with criminal scammers.
Instead, take time to pause and verify the situation through official Apple channels before calling random numbers.
2. Report the Scam Text
An important step is reporting scam texts to your mobile carrier:
- AT&T: Forward the text to 7726 (SPAM)
- T-Mobile: Forward to 7726
- Verizon: Forward to SPAM (7726)
- Sprint: Forward to short code #7726
You can also report scam texts by copying the original message and forwarding it to the FCC at 7726 (SPAM). This helps phone carriers in their efforts to trace and shut down scam operations.
3. Check Your Apple Account Security
Without calling any provided phone numbers, you can directly check for any unauthorized access to your Apple ID account:
- Open appleid.apple.com and log in to manage your account.
- Review account activity under “Security” for any recent purchases or unfamiliar device access.
- Check security and password settings. Enable two-factor authentication if not already on.
- Consider changing your Apple ID password if concerned about a breach. Avoid reusing this password anywhere else.
If everything looks normal, the text was likely a scam attempt with no actual account compromise. But verifying directly through Apple’s site is important.
4. Contact Apple Support If Account Issue Exists
If you do notice any unauthorized access, purchases or abnormal security issues on your Apple ID account after reviewing the details, contact Apple support immediately through their official channels, such as:
- The Apple Support app
- Getsupport.apple.com
- 1-800-275-2273
You can find authorized Apple support contact options at https://support.apple.com.
5. Wipe and Restore Your Apple Device
If you did unfortunately call a scam number and grant remote access to your device, consider the security compromised. Performing a factory reset/wipe is recommended:
- iPhone: Erase all content and settings in Settings > General > Reset
- iPad: Erase all content and settings in Settings > General > Reset
- Mac: Use Recovery Mode to erase and reinstall macOS
This will remove any spyware, malware or backdoor access that may have been installed by scammers. Also change all passwords for any accounts accessed on the device.
6. Contact Your Bank
If you provided any financial account details or noticed any unauthorized transactions during the scam, call your bank immediately. Inform them you may be the victim of fraud and discuss options like freezing accounts, disputing charges and getting issued new account numbers.
7. Monitor Accounts and Credit Reports
Carefully monitor all your financial accounts and credit reports over the next few weeks. Look for any unusual charges or activity. Many scams play the long game, retaining account access to steal additional funds over time. Regularly reviewing statements and credit reports helps identify issues faster.
8. Educate Yourself on Tech Support Scams
Make time to educate yourself and others in your life on the red flags and deceptive tactics used in tech support scams. Knowledge truly is one of the best defenses.
Is Your Device Infected? Check for Malware
If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.
Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.
Scan your computer with Malwarebytes for Windows to remove malware
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes for Windows
You can download Malwarebytes by clicking the link below.
MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes)-
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
-
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
-
Malwarebytes will now begin the installation process on your device.
-
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
-
On the final screen, simply click on the Open Malwarebytes option to start the program.
-
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
-
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
-
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Your computer should now be free of trojans, adware, browser hijackers, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
- Run a computer scan with ESET Online Scanner
- Ask for help in our Windows Malware Removal Help & Support forum.
Scan your computer with Malwarebytes for Mac to remove malware
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
-
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
MALWAREBYTES FOR MAC DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Mac) -
Double-click on the Malwarebytes setup file.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
-
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
-
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
-
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
-
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
Your Mac should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Scan your phone with Malwarebytes for Android to remove malware
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
-
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
MALWAREBYTES FOR ANDROID DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Android) -
Install Malwarebytes for Android on your phone.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
-
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
Tap on “Got it” to proceed to the next step.
Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
Tap on “Allow” to permit Malwarebytes to access the files on your phone. -
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
-
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
Your phone should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
- Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
- Ask for help in our Mobile Malware Removal Help & Support forum.
Frequently Asked Questions about the Apple Approval Notice Scam
1. What is the Apple Approval Notice scam?
The Apple Approval Notice scam is a phishing text message technique where scammers send fake account security alerts pretending to be from Apple. The texts warn about unauthorized purchases and provide a fraudulent customer support number. Victims who call are connected to criminal call centers that gain remote access to devices in order to steal personal and financial data.
2. How does the Apple Approval Notice scam work?
The scam works in several steps:
- Victims receive a phishing text message pretending to be an Apple security alert about suspicious account activity.
- The text urges victims to call a provided number for help securing their account.
- When victims call the number, they reach a criminal call center posing as Apple support.
- Scammers gain remote access to the victim’s device through screensharing apps, iCloud phishing links or Apple remote desktop tools.
- Once inside the device, scammers can steal personal data, install spyware, make fraudulent purchases and drain financial accounts.
3. What are examples of the scam text messages?
Scam texts impersonating Apple security often say:
- Your Apple ID has been used to purchase $412.38 on the App Store. If this transaction is unauthorized, call immediately.
- A new iPhone was ordered on Apple.com using your Apple ID. If this order is fraudulent call the number below.
- An unauthorized purchase of Apple Gift Cards was made using your Apple ID. Call to cancel this order before it is processed.
4. What should I do if I get one of these scam texts?
If you receive one of these scam texts:
- Do not call the number provided in the text message. It leads to criminal call centers.
- Report the scam text to your carrier and the FCC by forwarding it to 7726 (SPAM).
- Check your Apple account activity directly through appleid.apple.com for any unauthorized access.
- Contact Apple support through official channels like the Apple Support app if account issues exist.
5. What happens if I call the number provided in the text?
The numbers in scam Apple texts connect to sophisticated criminal call centers posing as Apple support. They will pretend to help fix the account issue, eventually asking for remote access to your device in order to steal personal data and commit fraud under the guise of tech support.
6. How can I tell if a call is really from Apple support?
Apple does not initiate unsolicited calls or texts to request personal data or offer tech support. Any communication warning about account issues and offering a callback number is an indicator of a scam. Legitimate Apple support numbers are listed publicly on apple.com.
7. What should I do if I gave the scammers remote access to my device?
- Factory reset your device to wipe any malware or backdoors.
- Change all account passwords accessed on that device.
- Contact your bank about any unauthorized transactions.
- Place fraud alerts and monitor your credit reports.
8. How can I protect myself from the Apple Approval Notice scam?
- Never call numbers provided in unsolicited texts, even if claiming to be Apple.
- Be wary of any unexpected calls or texts requesting personal data or offering tech support.
- Avoid allowing remote access to your device by unknown numbers.
- Educate yourself on common phishing and account security scam tactics.
9. Is Apple trying to stop this scam campaign?
Yes, Apple is actively working to shut down the scam call centers and have the fraudulent text messages blocked. They advise customers to report any suspicious texts to help identify the scammers. However, phone scams are constantly changing, so continued caution by consumers provides the best protection.
10. Who should I contact if I was a victim of the scam?
If you were tricked by the Apple Approval Notice scam, contact your bank, credit bureaus, Apple support and local law enforcement. Reporting scams helps authorities locate and prosecute criminal call center operations.
The Bottom Line
The Apple Approval Notice scam offers a sobering look at how mobile and data access are being weaponized to target consumers. But insight into common tactics like phishing texts and urgent security threats helps protect us. This scam also highlights why Apple and all legitimate companies avoid unsolicited messages offering support. Maintaining caution against random communications claiming account issues or requesting access is key to safeguarding our digital lives. Don’t let scammers leverage your own devices against you.