|
|
Date Reported: 15th February 2014  |
Risk Level: MEDIUM-HIGH  |
|
|
 |
 |
|
Email Subject: |
Computer or device not recognized - support |
|
Apparent Sender: |
apple  |
|
Return Address: |
noreply@incapple.com  |
|
Email Format: |
HTML  |
|
URL of Web Content: |
http://bit.do/cgi-bin-WebObjects-MyAppleId  |
|
Anchor text of URLs: |
1) https://appleid.apple.com  |
|
Location: |
ASHBURN, VIRGINIA, UNITED STATES  |
|
Scam number: |
22218-421662-1122269 |
|
Comments: |
- Email asks you to confirm/update/verify your account data at apple by visiting the given link. You will be taken to a spoof website where your details will be captured for the phishers.
- apple never send their users emails requesting personal details in this way.
|
|
|
|
 |
 |
|
|
|
MIME-Version: 1.0 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Mailer: ColdFusion 9 Application Server
Dear Custmer,
Your Apple ID, was just used to download "The Fight for Glorton" from the App Store, on another computer or device that had not previously been associated with that Apple ID. You may also be receiving this email if you reset your password since your last purchase.
This download was initiated from "Morocco".
|
|
|
|
Website: |
|
|
|
|
|
|
|
Please send us any scam/phishing emails you have received by reporting them here
For access to our huge blacklist of domain names and to sign up to our live feed of ALL the scams we receive please take a look at our Honeytrap service
If you have received the email below, please remember that it is very common for these email scams to be redistributed at a later date with only slightly different content, such as a different subject or return address, or with the fake webpage(s) hosted on a different webserver.
We aim to report every variant of the scams we receive, so even if it appears that a scam you receive has already been reported, please submit it to us anyway.
|