Description

Cybercriminals have devised a tactic to bypass Apple iMessage's phishing protection by exploiting user interaction. iMessage disables links in messages from unknown senders to prevent phishing, but Apple confirms that replying to such messages or adding the sender to the contact list re-enables these links. Recently, phishing campaigns have intensified, using fake USPS and unpaid road toll messages to prompt users to reply with "Y" or similar responses. These smishing texts often suggest reopening or copying the link to a browser, further enticing users to interact with the malicious content. This method leverages users’ familiarity with replying “Yes” or “STOP” to confirm or opt-out of legitimate text communications. By replying, users unintentionally disable the built-in phishing protection for the specific message and signal to attackers that their number is active and responsive. Even if no links are clicked, the act of replying increases the likelihood of further targeting. Older individuals and less tech-savvy users, who may be unsure about the authenticity of such messages, are especially vulnerable. These attacks often aim to steal sensitive information, such as personal details or credit card numbers. To mitigate these risks, users are advised never to reply to messages from unknown senders, especially those with disabled links. Instead, they should directly contact the purported sender, like USPS or another organization, to verify the message's authenticity. Awareness and vigilance remain critical to thwart these increasingly sophisticated smishing campaigns.