Apple Billing Support Scams EXPOSED – Full Investigation

Apple Billing Support scam messages are fake fraud alerts sent by text and email to make you panic and call a phone number controlled by scammers.

They usually claim there was a suspicious Apple Pay charge, a billing problem, or unauthorized Apple ID activity. If you call, the scam can quickly turn into a fake tech support operation where criminals try to gain remote access to your device, steal account and banking information, and pressure you into sending money.

This is the same scam, whether it arrives as a text message or an email.

1x 24

Scam Overview

What this scam is and why it keeps working

The Apple Billing Support scam is an impersonation scam built around urgency.

The message pretends to come from an Apple billing, fraud, or customer support department. It often includes a realistic charge amount, a fake case number, and language that sounds like a security review or payment verification notice.

The goal is not to help you fix anything.

The goal is to make you call the phone number in the message.

Once you call, the scammers take over the situation. They sound professional, they use support-style language, and they move the conversation from “billing issue” to “device security” or “fraud prevention” very quickly.

That shift is what makes this scam so dangerous.

A lot of people think they are only checking a charge. In reality, they are stepping into a fake support script designed to steal access, money, or both.

Why scammers use Apple as the brand

Apple is one of the most trusted consumer brands in the world.

Scammers know that people are more likely to respond to a message that mentions Apple Pay, Apple ID, App Store charges, or Apple billing support than a random unknown company.

They also know that many people already use:

  • iPhones
  • iPads
  • MacBooks
  • Apple Pay
  • App Store subscriptions
  • iCloud services

That makes the alert feel plausible, even if the details are fake.

The scam does not need perfect writing.

It only needs to sound believable enough for a stressed person to think, “I should call and fix this right now.”

The same scam appears in both texts and emails

This is not two separate scams.

It is one scam model delivered through different channels.

The text version usually looks shorter and more urgent. It may mention a suspicious charge and tell you to call immediately to stop an auto debit or cancel a transaction.

The email version often looks more formal. It may include a fake billing department label, a fake case ID, a timestamp, and a support number listed more than once.

In both versions, the script is the same:

  1. Claim there is a billing or fraud problem
  2. Create urgency
  3. Push you to call a number
  4. Move you into a fake support call
  5. Steal information or money

That is why it is important to treat Apple Billing Support texts and Apple Billing Support emails as part of the same fraud campaign.

Why these messages feel convincing at first glance

Scammers are not trying to write perfect corporate messages.

They are trying to trigger a quick emotional reaction.

They do that by combining four powerful tactics.

1) They use a specific dollar amount

A message that says “You were charged $623.00” or “$143.95” feels more real than a vague warning.

Specific amounts make people think there must be a real transaction record behind the alert.

This is a psychological tactic.

It pushes you to react before you verify.

2) They mention Apple Pay or Apple ID activity

Apple Pay and Apple ID both sound serious because they involve payment and account access.

If the message says there was an Apple Pay charge or suspicious Apple ID activity, many people assume their account may already be compromised.

That fear is exactly what the scammer wants.

3) They create a short deadline

Most scam messages include a time pressure element.

Examples include:

  • “Call immediately to cancel”
  • “Failing to respond may lead to auto debit”
  • “Charge will be processed within 24 hours”
  • “Account access may remain active until verified”

Urgency is not there to protect you.

It is there to stop you from slowing down and checking your real Apple account.

4) They give you a direct phone number

This is the most important part of the scam.

The scammer wants you to use their phone number, not an official support channel.

If you call the number in the message, they control everything that happens next.

That is why the phone number is the real trap.

Common red flags in Apple Billing Support scam texts and emails

These scam messages vary in layout and wording, but they often share the same warning signs.

If you know what to look for, they become much easier to spot.

They use odd wording or awkward phrasing

Many scam messages sound almost professional, but not quite.

They may include phrases like:

  • “That looks suspicious to us”
  • “Failing may lead to auto debit”
  • “Your appointment has been booked” in a billing alert
  • “Review or cancel during the appointment”

The layout may look polished, but the wording often feels off.

That mismatch is a strong red flag.

They mix billing, fraud, and tech support language in one message

Legitimate billing notifications are usually clear and focused.

Scam messages often blend multiple topics together:

  • Payment processed
  • Suspicious sign in
  • Apple Pay activation
  • Fraud lock
  • Support escalation
  • Billing cancellation

This is not normal customer communication.

It is a pressure script designed to hook more people.

If the billing angle does not scare you, the “security” angle might. If the security angle does not work, the “charge will not be reversed” line might.

They include fake details that sound technical

Scammers often add extra details to appear credible, such as:

  • A timestamp
  • A case ID
  • A location
  • A support department name
  • A device or network detail

These details are there to create the illusion of a real system-generated notice.

In many cases, the details are inconsistent, generic, or obviously made up if you read carefully.

The scammer is counting on you not reading carefully.

They repeat the support number multiple times

This is very common in scam emails.

The number may appear in:

  • The body text
  • The support line
  • The billing section
  • The closing signature

That repetition is not about being helpful.

It is about increasing the chance that you call.

They tell you not to reply, but to call

A lot of scam emails end with something like “This is an automated message, please do not reply” and then push you to call a number.

That wording can make the message feel official.

It is another manipulation tactic.

The scammer wants to force the interaction into a live phone call because that is where they can apply pressure, improvise, and keep you engaged.

Why this is more than a fake billing alert

Many people assume the worst-case scenario is a fake charge.

The real danger is what happens after you call.

Apple Billing Support scams are often the front end of a larger fake tech support fraud. Once the caller has your attention, they may claim:

  • Your iPhone is compromised
  • Your Apple ID was accessed by a hacker
  • Your computer has malware
  • Your banking apps are at risk
  • They need to secure your device before they can cancel the charge

This is where the scam escalates.

The billing alert is just the entry point.

The real objective is to get access to your device, your accounts, or your money.

How the scam harms victims

Victims can lose money in several different ways.

Not every case follows the exact same script, but the damage usually falls into one or more of these categories.

Account theft

The scammer may collect:

  • Apple ID credentials
  • Email passwords
  • Verification codes
  • Security answers

Once they have those, they may try to access other accounts, reset passwords, or lock the victim out.

Banking theft

If the scammer sees the victim log into online banking, or convinces the victim to “verify” payment details, they may steal:

  • Bank login credentials
  • Card details
  • Account numbers
  • One-time passcodes

Some scammers also trick victims into making transfers under the false claim that the money is being “secured.”

Remote device access

If the scammer gets the victim to install a remote access app, they may be able to:

  • View the screen in real time
  • Control the device
  • Open websites
  • Monitor typed information
  • Change settings
  • Install additional software

This can turn a simple phone scam into a much broader compromise.

Gift card fraud

Many Apple Billing Support scams end with a demand for gift cards.

The scammer may claim:

  • A refund was issued incorrectly
  • A payment needs to be “verified”
  • The account must be “secured” temporarily
  • A charge reversal requires an alternate method

Gift card requests are a clear sign of fraud.

Once the codes are shared, the money is usually gone.

Why smart people still fall for it

This scam does not work because people are careless.

It works because the message is designed to trigger normal human reactions.

People act quickly because they are trying to do the right thing:

  • Protect their account
  • Stop a charge
  • Prevent identity theft
  • Fix a billing problem

Scammers exploit that instinct.

They create a false emergency and then present themselves as the solution.

That is why the most effective defense is not technical. It is behavioral.

Never use the phone number or links in the alert.

If you want to verify a charge, go directly to your Apple account, Apple Pay history, or official support channels on your own.

The core pattern to remember

No matter how the message is styled, the pattern is usually the same:

  • The message creates panic
  • The phone number creates a trap
  • The call creates false trust
  • The scammer creates a bigger problem
  • The victim is pushed into giving access or money

Once you understand that pattern, these scams become much easier to recognize.

It stops being “Maybe this is real.”

It becomes “This is another fake billing support setup trying to get me on the phone.”

How The Scam Works

Stage 1: You receive a fake Apple Billing Support text or email

The first contact usually looks like a fraud or billing alert.

The message may claim:

  • A recent Apple Store charge was processed
  • Apple Pay was used without authorization
  • A payment is pending
  • Your Apple ID was used from a new device
  • A suspicious sign-in was detected
  • Your transaction was placed on hold pending verification

At this stage, the scammer is not asking for passwords yet.

They are trying to trigger urgency and fear.

Most victims act because they do not want to risk an unauthorized charge, not because they fully trust the message.

That is exactly what the scammer is counting on.

Stage 2: The message pushes you to call immediately

This is the central action the scammer wants.

The message often includes a warning such as:

  • “Call immediately to cancel”
  • “Failure to respond may lead to auto debit”
  • “Charge will not be reversed”
  • “Transaction will be completed if no action is taken”

This language is designed to make waiting feel dangerous.

A lot of people think, “I will just call and confirm.” That feels reasonable in the moment.

But once you call the number in the message, you are no longer dealing with a billing alert. You are dealing with a live fraud operator.

Stage 3: A fake support agent answers and sounds professional

The person who answers usually sounds calm and trained.

They may introduce themselves as:

  • Apple Billing Support
  • Apple Fraud Prevention Team
  • Apple Customer Billing Department
  • Apple Account Security
  • Senior Apple Technician

They often use a fake case number or ticket number to make the call sound official.

They may also thank you for “calling quickly” or say they are glad you reported the issue in time.

This is an important psychological move.

The scammer is trying to position themselves as your helper before they make any suspicious requests.

Stage 4: They ask a few basic questions to build trust

Before the scam becomes obvious, the caller often asks harmless-looking questions.

Examples include:

  • Your name
  • Phone number
  • ZIP code
  • Device type
  • Whether you use Apple Pay
  • Whether you use an iPhone, iPad, or Mac
  • Whether you noticed any other suspicious activity

These questions serve two purposes.

First, they make the interaction feel like a normal support process.

Second, they help the scammer tailor the script to your situation.

If you mention a Mac, they may shift toward a computer security story. If you say you use Apple Pay often, they may push the billing fraud angle harder.

Stage 5: The scammer introduces a bigger “security problem”

This is where the scam usually changes from billing support to fake tech support.

The caller may say something like:

  • “This charge is linked to a compromised Apple ID session”
  • “Your device appears to be connected to suspicious activity”
  • “Someone may have remote access to your phone or computer”
  • “We need to secure your device before we can cancel the charge”
  • “Your banking apps may be at risk”

This is not a real diagnosis.

It is a scripted escalation.

The scammer wants you scared enough to follow technical instructions without questioning them.

At this point, many victims are no longer focused on the original charge amount. They are focused on “Is my device hacked?”

That shift is intentional.

Stage 6: They ask you to install remote access software

This is one of the most dangerous moments in the scam.

The fake support agent may instruct you to install a remote access or screen-sharing tool such as:

  • AnyDesk
  • TeamViewer
  • Another remote support app

They may explain it as a standard support procedure so they can:

  • “Inspect your device”
  • “Secure your Apple account”
  • “Remove malicious access”
  • “Process the cancellation”
  • “Issue a refund”

Once the app is installed, they ask for the connection code or approval.

If you provide it, they may gain the ability to see your screen and control your device.

From the scammer’s point of view, this is the breakthrough.

They no longer need to guess. They can watch what you do in real time.

Stage 7: They use remote access to guide and manipulate you

After connecting, the scammer often moves fast and keeps talking.

They may open pages, direct you where to click, and instruct you to log into accounts “for verification.” The conversation is designed to keep you busy and prevent you from thinking clearly.

They may ask you to log into:

  • Your Apple account
  • Your email
  • Your bank
  • Your credit card account
  • A payment app

Even if they do not directly type your passwords, they may watch you enter them.

Some scammers also use fake websites that look like billing portals or support pages. Others rely on real websites and simply observe everything during the remote session.

Either way, the goal is the same:

  • Capture credentials
  • Capture verification codes
  • Capture financial details

Stage 8: They create a fake refund or cancellation process

A common script at this point is the fake refund setup.

The scammer tells you they canceled the suspicious charge and issued a refund. Then they claim something went wrong.

They might say:

  • “The refund was processed for the wrong amount”
  • “A decimal error happened”
  • “The system credited too much”
  • “You received a duplicate refund”

This is a lie, but it is a very effective one.

Now the scammer frames the situation as a problem you need to fix.

The victim goes from “I am trying to stop a charge” to “I need to send money back.”

That emotional switch is the reason the fake refund trick is used so often.

Stage 9: The payment demand begins

After the fake refund story, the scammer asks for repayment using methods that are hard to reverse.

Common demands include:

  • Gift cards
  • Bank transfers
  • Wire transfers
  • Cryptocurrency
  • Payment apps

They may claim this is needed to:

  • Reverse the refund error
  • Verify your identity
  • Secure the account
  • Clear the billing hold
  • Complete the fraud cancellation

None of this is legitimate.

It is simply the final stage of the theft.

Gift cards are especially common because they are easy to drain and difficult to recover. The scammer may stay on the phone while you go to a store, buy the cards, and read the codes aloud.

They often keep victims on the line to prevent them from talking to family, store employees, or bank staff who might interrupt the scam.

Stage 10: They may steal more than money

Even if the victim does not send money, the scammers may still walk away with valuable information.

During the call or remote session, they may collect:

  • Apple ID credentials
  • Email credentials
  • Phone number
  • Address
  • Banking logins
  • Card numbers
  • One-time passcodes
  • Photos of IDs or documents
  • Device details

That information can be used later for:

  • Account takeovers
  • Password reset attempts
  • Identity theft
  • Follow-up scams
  • Selling the victim’s data to other scam groups

This is why “I did not pay them” does not always mean no damage was done.

If you shared credentials or gave remote access, you still need to secure your accounts.

Stage 11: Follow-up calls and repeat attempts

Many victims get contacted again after the first scam attempt.

The follow-up caller may pretend to be:

  • Apple escalation support
  • A refund department
  • Your bank’s fraud team
  • A compliance officer
  • A government agency
  • A recovery service

The story changes, but the goal remains the same.

Sometimes the follow-up scam is even more dangerous because the scammer already knows details from the first call. They may reference your earlier “case” to sound legitimate.

Victims often think, “They know the case number, so they must be real.”

The case number is fake. It was created by the first scammer and shared with the second one.

Stage 12: Why the billing angle is so effective

The billing angle works because it gives the scammer a believable reason to start the call.

If the first message said “Your device is hacked,” many people would ignore it.

But if it says “Apple Store charge for $623.00” or “Apple Pay payment pending,” people respond faster because money feels immediate and measurable.

The billing message gets you on the phone.

The tech support story keeps you on the phone.

The refund or gift card demand takes your money.

That is the full funnel.

Stage 13: The exact wording changes, but the scam logic stays the same

Scammers constantly test different wording.

You may see variations like:

  • Apple Billing Support
  • Apple Fraud Prevention Team
  • Apple Security Alert
  • Apple Customer Billing Department
  • Apple Account Services

They may change:

  • The dollar amount
  • The city
  • The support number
  • The case ID
  • The warning language

None of that changes the underlying scam.

The logic is always the same:

  1. Create fear
  2. Push a phone call
  3. Build trust
  4. Claim a device or account problem
  5. Ask for remote access or credentials
  6. Demand money

When you recognize that sequence, you can spot the scam even if the wording looks new.

What To Do If You Have Fallen Victim to This Scam

If you interacted with the scam, do not panic.

You can still reduce the damage if you act quickly and in the right order.

Use the steps below based on what happened.

1) If you only received the message and did not call or click anything

This is the best-case scenario.

Take these steps:

  1. Do not reply to the text or email.
  2. Take a screenshot for your records.
  3. Block the number if it was a text.
  4. Mark the email as spam or phishing if it was an email.
  5. Delete the message after reporting it.
  6. Check your Apple account and payment history directly, only if you want peace of mind.

At this stage, the scammer has not gained access to anything unless you engage.

2) If you called the number but hung up early

You may have avoided the worst part, but stay alert.

Do this next:

  1. Block the number.
  2. Do not answer follow-up calls from unknown numbers.
  3. Ignore voicemails that reference the same “billing case.”
  4. Do not trust caller ID labels that mention Apple or billing support.
  5. Verify any real concerns by checking your Apple account yourself.

If you did not share information, your risk is much lower, but scammers may try to recontact you.

3) If you clicked a link in the email or text

Treat this as a possible phishing exposure.

Even if the page looked harmless, take these steps:

  1. Close the page immediately.
  2. Do not download anything.
  3. Do not enter any password or code.
  4. Check your device for unexpected downloads or apps.
  5. Run a security scan on your computer if you clicked from a laptop or desktop.
  6. Change your password right away if you entered it on the site.

If you entered a verification code on the site, treat your account as compromised and move to the next steps immediately.

4) If you gave your Apple ID password or verification code

This is urgent, but fixable if you move fast.

Do this immediately from a trusted device:

  1. Change your Apple ID password.
  2. Review devices signed into your Apple account.
  3. Remove any device you do not recognize.
  4. Review your recovery email and recovery phone number.
  5. Check your payment methods on the account.
  6. Review recent purchases and subscriptions.
  7. Change your email password too, especially if it is tied to your Apple account.

Why your email matters:

If scammers gain access to your email, they may use it to reset passwords for banking, shopping, and social media accounts.

5) If you reuse the same password on other accounts

This is a major risk after phishing and fake support scams.

If the password you shared is used anywhere else, change it everywhere.

Prioritize these accounts first:

  • Main email account
  • Banking and credit cards
  • Payment apps
  • Shopping accounts
  • Social media
  • Cell phone carrier account

Use a different password for each account going forward.

If one password gets exposed again, it will not unlock everything else.

6) If you installed AnyDesk or another remote access app

Treat your device as potentially compromised.

Take these steps right away:

  1. Disconnect the device from the internet.
  2. End any active remote session.
  3. Uninstall the remote access app.
  4. Restart the device.
  5. Check for new apps, extensions, or settings you did not approve.
  6. Run a full security scan.
  7. Change critical passwords from a different trusted device if possible.

If you are not comfortable doing this yourself, get help from a trusted local technician or someone you know, not a phone number from a pop-up, text, or email.

7) If you logged into your bank or card account during the call

Assume the scammer may have seen what you typed.

Do not wait for charges to appear.

Call your bank or card issuer using the number on the back of your card or from the official app. Tell them you may have been targeted by a fake billing support or remote access scam.

Ask them to:

  • Monitor for fraud
  • Replace cards if needed
  • Add extra verification
  • Review recent activity
  • Flag the account for possible compromise

Be clear and direct.

You are not reporting a “maybe.” You are reporting a likely exposure.

8) If you sent money, gift cards, or payment app transfers

Act immediately. Time matters.

If you paid with gift cards

  1. Gather the receipts and card numbers.
  2. Contact the gift card issuer right away.
  3. Report that the cards were used in a scam.
  4. Ask if any balance can be frozen or recovered.
  5. Save all screenshots and call logs.

If you sent a bank transfer or wire

  1. Contact your bank immediately.
  2. Ask for fraud support.
  3. Request a transfer recall if possible.
  4. Ask them to flag the receiving account.

If you sent money through a payment app

  1. Report the payment as fraud inside the app.
  2. Contact app support directly.
  3. Save the transaction ID and screenshots.

Recovery is not guaranteed, but acting fast gives you the best chance.

9) If the scammers asked for documents or ID photos

Some Apple Billing Support scams eventually ask for identity verification documents.

If you sent anything like:

  • Driver’s license
  • Passport
  • Utility bill
  • Bank statement
  • Social Security-related documents

Take identity theft risk seriously.

Next steps should include:

  1. Monitoring your financial accounts closely
  2. Watching for new account openings or suspicious mail
  3. Considering a fraud alert or credit freeze
  4. Keeping a timeline of what you sent and when

This type of information can be reused for future fraud even if no money was stolen on the first call.

10) Report the scam properly

Reporting matters because it helps flag numbers, message templates, and scam patterns.

At a minimum, report it to:

  • Your email provider (mark as phishing)
  • Your mobile carrier (report spam text)
  • The FTC (ReportFraud)
  • Apple phishing reporting channels
  • The FBI IC3 if money was lost or sensitive data was exposed

When reporting, include:

  • The phone number used by the scammer
  • The text or email wording
  • The date and time
  • The amount they claimed
  • Any names or departments they used
  • Whether remote access software was involved
  • Whether gift cards or transfers were requested

The more specific your report is, the more useful it becomes.

11) Save evidence before you delete everything

It is normal to want the message gone immediately.

Before deleting it, save the evidence.

Keep:

  • Screenshots of the email or text
  • Call logs
  • Voicemails
  • Remote access app names
  • Payment receipts
  • Gift card numbers and receipts
  • Emails sent by the scammers
  • Notes about what they said

This helps with reports, bank disputes, and future follow-up if needed.

12) Watch for follow-up scams

Victims of one scam are often targeted again.

The next caller may claim to be:

  • A refund specialist
  • A bank fraud investigator
  • A cybersecurity consultant
  • A recovery team
  • A government representative

They may say they can help recover your money for a fee.

This is often another scam.

Be especially cautious if a caller already knows details about the first incident. That usually means your information has been shared among scammers.

13) Use a simple protection rule for the future

The best rule is simple and effective:

Never use the phone number or links in a billing or security alert message.

If you want to verify something, do it yourself:

  • Open your Apple account directly
  • Check your Apple Pay history in your wallet
  • Check your bank statement
  • Contact official support through the company website or app you open on your own

This one habit prevents most Apple Billing Support scams, even when the message looks convincing.

Is Your Device Infected? Scan for Malware

If your computer or phone is slow, showing unwanted pop-ups, or acting strangely, malware could be the cause. Running a scan with Malwarebytes Anti-Malware Free is one of the most reliable ways to detect and remove harmful software. The free version can identify and clean common infections such as adware, browser hijackers, trojans, and other unwanted programs.

Malwarebytes works on Windows, Mac, and Android devices. Choose your operating system below and follow the steps to scan your device and remove any malware that might be slowing it down.

Malwarebytes for WindowsMalwarebytes for MacMalwarebytes for Android

Run a Malware Scan with Malwarebytes for Windows

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes

    Download the latest version of Malwarebytes for Windows using the official link below. Malwarebytes will scan your computer and remove adware, browser hijackers, and other malicious software for free.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK

    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Once the scan completes, remove all detected threats. Your Windows computer should now be clean and running smoothly again, free of trojans, adware, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Run a Malware Scan with Malwarebytes for Mac

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

After scanning, delete any detected threats. Your Mac should now be free from adware, unwanted extensions, and other potentially harmful software.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Run a Malware Scan with Malwarebytes for Android

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


When the scan is finished, remove all detected threats. Your Android phone should now be free of malicious apps, adware, and unwanted browser redirects.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

After cleaning your device, it’s important to protect it from future infections and annoying pop-ups. We recommend installing an ad blocker such as AdGuard. AdGuard blocks malicious ads, prevents phishing attempts, and stops dangerous redirects, helping you stay safe while browsing online.

The Bottom Line

Apple Billing Support text and email scams are the same impersonation scam delivered in different formats.

They use fake billing alerts and fake Apple Pay warnings to create panic, then push you into calling a phone number that leads to scammers. From there, the scam can escalate into remote access requests, stolen credentials, fake refund tricks, and payment demands through gift cards or other hard-to-reverse methods.

If you receive one of these messages, do not call the number and do not click the links. Verify your account only through official channels you open yourself.

If you already interacted with the scam, move quickly, secure your accounts and devices, contact your bank if needed, and report the incident. Fast action can stop a bad situation from becoming much worse.

FAQ

Are Apple Billing Support texts and emails real?

In scam cases, no. These messages are fake Apple billing or fraud alerts designed to scare you into calling a scammer-controlled phone number.

The goal is to move you into a live phone call where the scammer can pressure you, collect information, or steal money.

Is this the same scam as the Apple Fraud Prevention Team alert?

Yes.

Scammers use different labels like Apple Billing Support, Apple Fraud Prevention Team, Apple Security Alert, or Apple Customer Billing Department, but the script is usually the same.

Why do these scam messages mention a specific charge amount?

Scammers use exact amounts like $143.95 or $623.00 to make the alert feel more believable.

A specific amount does not prove the message is real. It is often just part of the scam script.

Why do they send both texts and emails?

Because they want more chances to reach you.

Some people respond to text alerts faster. Others trust email more. The scam works the same way in both formats.

What is the main red flag in these messages?

The biggest red flag is the phone number in the message.

The scam depends on getting you to call their number. Once you call, they control the conversation.

What happens if I call the number?

You usually reach a fake support center.

The caller may pretend to be Apple billing, fraud prevention, or technical support. They may claim your Apple ID or device is compromised and push you into risky steps.

Why do scammers ask me to install AnyDesk or another remote access app?

They want access to your device.

If you install a remote access app and approve the connection, scammers may be able to watch your screen, control your device, and steal passwords, banking details, or verification codes.

Can they steal money even if the original charge was fake?

Yes.

The fake charge is just the hook. The real theft usually happens later through fake refund scams, account theft, bank fraud, or gift card payments.

Why do they ask for gift cards?

Because gift cards are hard to trace and hard to recover.

Any caller claiming to be Apple support who asks for gift cards is running a scam.

How can I check if there was a real Apple charge?

Check directly through official sources only.

Review your Apple purchase history, Apple Pay transactions, and bank or card statements using apps or websites you open yourself. Do not use links or phone numbers from the message.

What should I do if I only received the message and did not call or click anything?

That is the best case.

Take a screenshot, report it as spam or phishing, block the number if it was a text, and delete it.

What should I do if I called but did not give any information?

Hang up and do not call back.

Block the number, ignore follow-up calls, and verify your Apple account directly through official channels if you want to confirm everything is normal.

What should I do if I gave them my Apple ID password or a verification code?

Act immediately.

Change your Apple ID password, review your signed-in devices, remove anything you do not recognize, and change your email password too, especially if it is linked to your Apple account.

What should I do if I installed remote access software?

Treat it as urgent.

Disconnect from the internet, end the remote session, uninstall the app, restart your device, and change important passwords from a trusted device. If you logged into banking or card accounts during the call, contact your bank right away.

Can scammers spoof caller ID and make it look legitimate?

Yes.

Caller ID can be spoofed, so a call that looks like Apple or a familiar number is not proof that it is real.

How do I report Apple Billing Support scam texts and emails?

Use the reporting tools available to you:

  • Mark the email as phishing or spam
  • Report the text as junk in your messaging app
  • Forward scam texts to 7726 (SPAM)
  • Report the scam to Apple phishing reporting channels
  • File a report with the FTC
  • File a report with the FBI IC3 if money was lost or sensitive information was exposed

What is the best way to avoid this scam in the future?

Use one rule every time:

Never call the number or click the links in a billing or security alert message.

Always verify the issue by opening your Apple account, Apple Pay, or Apple Support through official channels on your own.

10 Rules to Avoid Online Scams

Here are 10 practical safety rules to help you avoid malware, online shopping scams, crypto scams, and other online fraud. Each tip includes a quick “if you already got hit” action.

  1. Stop and verify before you click, log in, download, or pay.

    warning sign

    Most scams win by creating urgency. Verify using a trusted method: type the website address yourself, use the official app, or call a known number (not the one in the message).

    If you already clicked: close the page, do not enter passwords, and run a malware scan.

  2. Keep your operating system, browser, and apps updated.

    updates guide

    Updates patch security holes used by malware and malicious ads. Turn on automatic updates where possible.

    If you saw a scary “update now” pop-up: close it and update only through your device settings or the official app store.

  3. Use layered protection: antivirus plus an ad blocker.

    shield guide

    Antivirus helps block malware. An ad blocker reduces scam redirects, phishing pages, and malvertising.

    If your browser is acting weird: remove unknown extensions, reset the browser, then run a full scan.

  4. Install apps, software, and extensions only from official sources.

    install guide

    Avoid cracked software, “keygens,” and random downloads. During installs, choose Custom/Advanced and decline bundled offers you do not recognize.

    If you already installed something suspicious: uninstall it, restart, and scan again.

  5. Treat links and attachments as untrusted by default.

    cursor sign

    Phishing often impersonates delivery services, banks, and popular brands. If it is unexpected, do not open attachments or log in through the message.

    If you entered credentials: change the password immediately and enable 2FA.

  6. Shop safely: research the store, then pay with protection.

    trojan horse

    Be cautious with brand-new stores, “closing sale” stories, and prices that make no sense. Prefer credit cards or PayPal for dispute options. Avoid wire transfers, gift cards, and crypto payments.

    If you already paid: contact your card issuer or PayPal quickly to dispute the transaction.

  7. Crypto rule: never pay a “fee” to withdraw or recover money.

    lock sign

    Common patterns include fake profits, then “tax,” “gas,” or “verification” fees. Another is a “recovery agent” who demands upfront crypto.

    If you already sent crypto: stop paying, save evidence (wallet addresses, TXIDs, chats), and report the scam to the platform used.

  8. Secure your accounts with unique passwords and 2FA (start with email).

    lock sign

    Use a password manager and unique passwords for every account. Enable 2FA using an authenticator app when possible.

    If you suspect an account takeover: change passwords, sign out of all devices, and review recent logins and recovery settings.

  9. Back up important files and keep one backup offline.

    backup sign

    Backups protect you from ransomware and device failure. Keep at least one backup on an external drive that is not always connected.

    If you suspect infection: do not connect backup drives until the system is clean.

  10. If you think you are a victim: stop losses, document evidence, and escalate fast.

    warning sign

    Move quickly. Speed matters for disputes, account recovery, and limiting damage.

    • Stop payments and contact: do not send more money or respond to the scammer.
    • Call your bank or card issuer: block transactions, replace the card if needed, and start a dispute or chargeback.
    • Secure your email first: change the email password, enable 2FA, and remove unfamiliar recovery options.
    • Secure other accounts: change passwords, enable 2FA, and log out of all sessions.
    • Scan your device: remove suspicious apps or extensions, then run a full malware scan.
    • Save evidence: screenshots, emails, order pages, tracking pages, wallet addresses, TXIDs, and chat logs.
    • Report it: to the payment provider, marketplace, social platform, exchange, or wallet service involved.

These rules are intentionally simple. Most online losses happen when decisions are rushed. Slow down, verify independently, and use payment methods and account controls that give you recourse.

Leave a Comment

Previous

WinaBet.cc Scam EXPOSED – Full Investigation

Next

Xowau Scam EXPOSED – Full Investigation