The release of the iPhone 15 lineup has brought with it a new wave of phishing scams seeking to capitalize on people’s desire to get the latest Apple gadgets. One such scam purports to give away free iPhone 15 devices through fraudulent contests and surveys.
This detailed guide will uncover how the “You’ve WON an iPhone 15!” phishing scam works, provide tips to avoid falling victim, and instructions on what to do if you took the bait.
Overview of the Scam
The “You’ve WON an iPhone 15!” phishing scam relies on the excitement around Apple’s latest iPhone models to trick unsuspecting users into providing personal information and payment details.
Scammers send text messages, pop-up ads, or emails pretending to be from well-known retailers like BestBuy, Walmart, T-Mobile, Costco, AT&T, and Amazon. These messages congratulate the recipient on winning an iPhone 15, iPhone 15 Pro, or iPhone 15 Pro Max in a special giveaway or contest.
To claim the “prize”, victims are directed to click on a link which leads to a fake website styled to look like a customer survey for the spoofed brand. The scam page will request personal and financial information ostensibly to cover shipping fees and taxes for the free phone.
In reality, the promised iPhones don’t exist. The scammers are simply trying to steal personal and financial data to commit identity fraud or credit card theft.
This scam is particularly devious because it preys on people’s desire to get something for free. But as the saying goes, if it seems too good to be true, it probably is. No legitimate company is handing out free iPhone 15 devices to random strangers.
How the Scam Works Step-by-Step
Here is a step-by-step breakdown of how the “You’ve WON an iPhone 15!” phishing scam unfolds:
Step 1: Receiving the Hook Message
The scam starts with the victim receiving an unsolicited text message, pop-up browser ad, or email about winning a free iPhone 15.
The messages are made to look like they are from major retailers, cell phone providers, or Apple itself. Some examples:
- A text message stating “Congratulations! You’ve won an iPhone 15 Pro Max in the BestBuy Anniversary Giveaway! Claim your prize now: [malicious link]”
- A pop-up browser ad with the headline “Amazon is giving away 100 iPhone 15 phones RIGHT NOW. Click here to take our quick survey and receive your free iPhone 15 256GB today…before we run out!”
- An email entitled “Hurry! Claim your free iPhone 15 Pro from the AT&T 112th Anniversary Raffle” with a message congratulating you on being selected as a winner.
The messages will typically include the branding, logos, and messaging styles of the spoofed companies. This makes the free iPhone offer look legitimate at first glance.
In some cases, the messages add fabricated urgency with claims that supplies of the free phones are limited. They’ll say things like “act now before time runs out!” to pressure victims into clicking the claim link quickly.
Step 2: Taking the Phishing Survey
The claim link inside the hook message redirects to a carefully crafted phishing site designed to look like a customer survey for the impersonated brand.
Everything from the domain name to the branding will match the company – with the goal being to avoid raising red flags. So a scam claim link purporting to be from T-Mobile may go to a site that looks very much like “T-Mobile-Survey.com”.
The phishing survey page will congratulate you again on winning the iPhone and provide fake contest details to build credibility.
You’ll then be asked to complete a series of questions before you can claim your “prize”. These questions trick users into handing over personally identifiable information the scammers can use to steal identities.
Questions found on these fake survey forms include:
- Full name
- Home address
- Phone number
- Email address
- Date of birth
- Credit card number
- Social Security Number
The surveys are short, usually around 5-10 questions. The scammers want to collect your information quickly before you realize it’s a scam.
Some versions of the survey scam add countdown timers to the page, indicating the iPhone prizes are extremely limited. This places pressure on victims to rapidly fill out the questionnaire before time expires.
Step 3: Entering Payment Information
After completing the phishing survey, victims reach the final step – entering payment details.
A message appears stating there is a small shipping, handling, and taxes fee required to claim the “free” iPhone 15. Prices are usually between $5-10 to seem more legitimate.
Scammers don’t ask for large sums because that would be an obvious red flag. Small fees seem reasonable and help convince victims they really are just paying delivery costs for a free device.
The victim is instructed to enter credit card information to process the order. In addition to the card number, they are prompted to input:
- Card expiration date
- CVV security code
- ZIP code
Some versions of the scam even go as far as mimicking PayPal, Apple Pay, or Amazon Pay portals.
With all the necessary account credentials entered, the scammers can now conduct financial fraud.
Step 4: The Let Down
After submitting payment details, victims are redirected to a generic-looking confirmation page thanking them for participating.
It says the free iPhone is on its way and will arrive shortly.
But of course, the phone never comes.
At this point, the scammers have what they want – your personal information, financial details, and money from fake fees.
Victims realize they’ve been manipulated, but it’s too late. The scammers delete their fake sites and disappear with the stolen data.
All that the unlucky victims are left with is lost money and the harsh reality that free iPhones aren’t just given away.
How to Spot iPhone 15 Phishing Emails
Scammers regularly send phishing emails claiming you won a free iPhone 15. Stay alert for these signs of fraudulent iPhone emails:
1. Check the Sender’s Email Address
A real Apple email would come from apple.com or an official domain – not something random like app-le.com or apple-gifts.xyz. Hoover over links to reveal the actual URL that’s hidden.
Also look for misspellings of the brand name that seem legit at first glance.
2. Look for Poor Spelling and Grammar
Like text scams, phishing emails contain typos, awkward phrases, and grammatical errors. Messages from major brands like BestBuy or AT&T should be flawless.
3. Verify Your Personal Details
Legitimate emails won’t ask for lots of personal details upfront. Delete any email claiming you won a prize but requiring your full name, address, date of birth, etc. right away.
4. Pressuring Language
Phishing emails urge immediate action to claim your prize now or lose it forever. Subject lines say things like “Claim Your iPhone 15 Today Before Time Runs Out”.
But real corporate giveaways don’t force snap decisions under false deadlines. Delete these overly pushy emails.
5. No Logos or Branding
Authentic emails contain official logos, fonts, and color schemes of the brand. Check for missing or lower-quality images that don’t match the company.
6. Odd Attachments
Never open attachments from unknown emails, especially with generic names like “Document.pdf” or “Photo.zip”. They can contain malware.
7. You Can’t Win a Contest You Didn’t Enter
Step back and ask yourself if you really entered an iPhone giveaway with the merchant sending the email. If you didn’t, it can’t be legitimate.
Stay vigilant against slick phishing emails trying to trick you into giving up personal information for fake rewards. Major retailers don’t send unsolicited emails claiming you won free iPhones out of the blue. Use healthy skepticism when evaluating all prize emails to protect yourself from identity theft.
How to Spot iPhone 15 Text Message Scams
In addition to emails and online ads, scammers are sending iPhone 15 phishing scams via SMS text messages. With text scams on the rise, it’s crucial to know how to spot fraudulent messages claiming you won a free iPhone.
Here are 5 tips to identify iPhone 15 text scams:
1. Watch for Poor Spelling and Grammar
Text scams tend to be riddled with spelling, punctuation, and grammatical errors. The messages may say something like:
“CONGRATULATIONS!!! You’ve wonned an iPhone 15 Pro Max in are Apple Giveaway! Claim you’re prize here: [malicious link]”
The poor English is a clear red flag you’re dealing with scammers, not a legitimate corporation. Real companies proofread and spell check their texts.
2. Look for Odd Links
Take a close look at the claim link – does it match the brand sending the text? For example, if the message pretends to be from Verizon, but the link goes to a misspelled or suspicious domain, it’s phishing.
Scam claim links examples:
- reward-zone.verizon[.]com
- verizon-gift.claim-hub[.]xyz
3. Verify the Sender
iPhone 15 text scams spoof real phone numbers, so contacts alone aren’t enough. Open the text and look at the sender name.
“Apple Inc” and “T-Mobile Rewards” sound legitimate, but are easy to fake. Contact the company directly to verify if a text is authentic.
4. Watch for Pressure Tactics
Phishing texts use time pressure and manufactured scarcity to get you to act without thinking. Watch for urgent wording like:
- “Claim now! Just 100 iPhone 15 phones left for this giveaway!”
- “Hurry, this offer ends today! You must claim your iPhone 15 now or lose it forever.”
It’s a manipulation technique to get you clicking without evaluating the legitimacy of the message.
5. Offer is Too Good to Be True
Ask yourself – would Verizon/Apple/Amazon really text total strangers and give away the latest $1000 iPhone for free? The answer is no. If an offer seems too good to be true, it always is.
No legitimate company hands out brand new phones out of the blue. Delete obvious scam texts promising free iPhone 15s.
Stay vigilant for these telltale signs of SMS iPhone phishing scams. Legitimate companies don’t pressure you to click shady links and provide personal information for supposed “free gifts”. When in doubt, contact the sender directly through an official channel to verify an offer. Trust your instincts to help avoid text message scams.
How to Detect iPhone 15 Pop-up Scams
In addition to texts and emails, the iPhone 15 scam relies on fake pop-up ads and malvertising. Pop-ups that open saying you won a free iPhone 15 are phishing attempts to collect your data.
Watch for these signs of fraudulent pop-up ads:
1. Check the URL
Hover over the claim link in the pop-up. Does the URL match the advertised brand? For example, an Apple pop-up should go to apple.com, not app1es.com.
2. Poor Spelling and Grammar
Pop-up scams have typos, awkward phrasing, and bad grammar just like phishing texts and emails. Major corporations don’t make these mistakes.
3. Enormous Sense of Urgency
Scam pop-up ads utilize countdown timers or messages like “Just 5 free iPhones left!” to create pressure. But legitimate companies don’t force you to claim prizes under ridiculous time constraints.
4. Redirects to Another Site
Clicking the link may open a sketchy-looking site instead of taking you directly to the advertised brand’s website. This is a huge warning sign of malvertising.
5. No Way to Close the Pop-up
With real pop-up ads, you can usually close them by clicking the X in the corner. Scam pop-ups often won’t let you close them, forcing you to click the claim link to exit.
6. You Didn’t Enter the Contest
Think hard if you ever signed up for a contest sponsored by the advertised business. If not, an ad claiming you won can’t be legitimate.
Avoid clicking on pop-up ads with too-good-to-be-true offers, even if they look authentic at first glance. No major company is giving away iPhone 15s to random website visitors. Stay safe online by always verifying pop-up legitimacy before providing any personal information.
What to do if You Fell Victim to the iPhone 15 Scam
If you took the bait and supplied information or payment details to an “You’ve WON an iPhone 15!” phishing scam, here are the steps to take immediately:
Step 1: Contact Your Bank
If you entered any financial information, including credit cards, PayPal, Apple Pay, or Amazon Pay – your top priority is contacting your bank.
Report the charges as fraudulent so they can reverse the transactions, block the card from further use, and begin monitoring your account for other suspicious activity.
This quick action helps minimize losses from the stolen payment data. The sooner your credit card company knows, the better protected you are.
Step 2: Place Fraud Alerts
Since phishing scams are aimed at identity theft, you’ll want to put fraud alerts on your credit reports. This warns lenders to take extra precautions before approving new lines of credit.
To place fraud alerts, contact the three major credit bureaus:
- Equifax – (888) 766-0008
- Experian – (888) 397-3742
- TransUnion – (800) 680-7289
Initial fraud alerts last for one year and require lenders to verify your identity before issuing credit. Just be aware fraud alerts can slow down legitimate applications since extra steps are required. But it’s a prudent precaution after falling for a phishing scam.
Step 3: Monitor Your Accounts
Keep a very close eye on all your financial accounts over the next few months. Watch for any unauthorized charges no matter how small. Early detection of criminal activity makes it easier to halt damages.
Be sure to review:
- Credit cards
- Bank accounts
- Online payment services (PayPal, Venmo, etc)
- Retail sites where you have profiles
- Insurance and medical accounts
The scammers may sell your information to other cybercriminals, who could dip into your accounts months after the fact. Persistent monitoring gives you the best odds of thwarting secondary misuse.
Step 4: Change Passwords
If you reused passwords across multiple accounts, make sure to change them. The scammers may gain access to other profiles with the same login credentials you entered on the phishing site.
To avoid this scenario:
- Create unique, complex passwords for every account.
- Use a password manager app to track them.
- Turn on two-factor authentication when possible.
This turns each account into a walled fortress, preventing the iPhone 15 scam from leading to more extensive identity theft down the road.
Step 5: Watch for Suspicious Emails
Double check incoming emails going forward, especially those requesting personal information or linking to login portals. The phishing site might have been a gateway to install malware on your computer.
Be wary of:
- Emails from unknown senders
- Messages with poor spelling/grammar
- Links to strange websites
- Attachments from unfamiliar contacts
Delete such suspicious emails immediately. They could expose you to account breaches, wire transfer demands posing as friends or family, or ransomware attacks that encrypt your system until a bitcoin payment is made.
Stay vigilant since your email address is now on scammer lists ripe for ongoing targeting. Don’t let your guard down.
Step 6: Report the Scam
To help authorities track down the scammers, file reports about the iPhone 15 phishing scam with:
- FTC – Report fraud at ReportFraud.ftc.gov.
- FBI IC3 – Submit Internet crime reports at www.ic3.gov.
- Apple – Report phishing emails to reportphishing@apple.com.
- Cell Provider – Report spoofed text scams to your provider.
- Brands Impersonated – If the scam used a brand like Walmart or BestBuy, contact their customer service teams directly.
Your information joins other victim reports which law enforcement uses to trace these criminal operations, building stronger cases against them.
By reporting, you also help raise awareness of the scam impacting others. The more vigilant consumers are, the less profitable these scams become for cyber thieves.
Is Your Device Infected? Check for Malware
If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.
Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.
Scan your computer with Malwarebytes for Windows to remove malware
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes for Windows
You can download Malwarebytes by clicking the link below.
MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes)-
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
-
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
-
Malwarebytes will now begin the installation process on your device.
-
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
-
On the final screen, simply click on the Open Malwarebytes option to start the program.
-
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
-
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
-
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Your computer should now be free of trojans, adware, browser hijackers, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
- Run a computer scan with ESET Online Scanner
- Ask for help in our Windows Malware Removal Help & Support forum.
Scan your computer with Malwarebytes for Mac to remove malware
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
-
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
MALWAREBYTES FOR MAC DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Mac) -
Double-click on the Malwarebytes setup file.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
-
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
-
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
-
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
-
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
Your Mac should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Scan your phone with Malwarebytes for Android to remove malware
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
-
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
MALWAREBYTES FOR ANDROID DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Android) -
Install Malwarebytes for Android on your phone.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
-
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
Tap on “Got it” to proceed to the next step.
Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
Tap on “Allow” to permit Malwarebytes to access the files on your phone. -
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
-
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
Your phone should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
- Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
- Ask for help in our Mobile Malware Removal Help & Support forum.
Frequently Asked Questions About the iPhone 15 Scam
Here are answers to some frequently asked questions about the phishing scam offering free iPhone 15 devices:
Are the messages saying I won a free iPhone 15 real?
No. Apple and major retailers like BestBuy, Walmart, etc. are not sending unsolicited messages claiming you won free iPhones. This is always a scam tactic to steal personal information.
Can I actually win a free iPhone 15?
You cannot legitimately win a random iPhone giveaway you never entered. The scam ads falsely claim you were already selected as the winner. Real contests require you to opt-in and register first.
Is it safe to click on the link to claim the iPhone?
No, never click on links in free iPhone messages. They send you to fake lookalike sites designed to steal your data through phishing surveys.
If I pay a small shipping fee, will they really send me the free iPhone 15?
No. There is no actual iPhone. The scammers are just trying to steal your money along with your personal information. You’ll receive nothing.
Can I tell if an iPhone message is real or fake?
Yes. Real messages have perfect spelling/grammar, come from official domains, use legitimate branding, and don’t pressure urgency. Scams do the opposite.
What do the scammers want from the phishing survey?
The surveys ask for your PII, account logins, and financial data to steal identities, breach accounts, and commit payment fraud. Never enter anything.
What should I do if I already provided my information?
Immediately contact banks, place fraud alerts at credit bureaus, monitor your accounts closely, change passwords, and watch for other phishing attempts. File official reports.
How can I avoid iPhone 15 scams in the future?
Stay skeptical of too-good-to-be-true offers, ignore messages pressuring urgency, verify senders, avoid clicking unknown links, and screen pop-ups carefully. Trust your instincts.
Be cautious entering any sensitive information online. Legitimate companies don’t offer free iPhones out of the blue. Use healthy skepticism and vigilance to protect yourself from these phishing scams.
The Bottom Line
The release of Apple’s iPhone 15 lineup has introduced a dangerous new phishing scam promising free devices that instead steal personal information and money.
Savvy consumers avoid clicking on suspicious links in messages about free products. Remember – Apple and retailers don’t hand out high-end phones to random strangers.
Stay guarded for phishing scams when hot new devices come out. Check site URLs for authenticity and look for spoofed branding on claim forms. No legitimate company needs your Social Security number or full date of birth to give you a free product.
If you did fall victim and entered sensitive information, take immediate steps to freeze your credit and financial accounts. File reports to protect others from being scammed going forward.
Staying vigilant for clever social engineering techniques makes you immune to “You’ve WON an iPhone 15!” frauds trying to profit off human vulnerabilities. Use good digital hygiene and don’t let dreams of free tech put your identity and finances at risk.