Alert: MacBook users are also not safe, they are being targeted through Apple ID..
Shikha Saxena March 25, 2025 03:15 PM

If you also think that if you have a MacBook, then you are safe from hackers, then you are wrong. After targeting Windows users, now hackers have started making Mac users victims of phishing attack. After Microsoft released new anti-scareware updates to its Edge browser, cybercriminals have turned their attention to Mac and Safari users.

According to a ZDNet report, a cybersecurity firm called LayerX Labs has revealed this new phishing attack, which aims to steal the Apple ID of Mac users. If hackers gain access to the Apple ID, they can access iCloud accounts, photos, files, phone backups, and other important data.

Method of attack on Windows users

According to the LayerX report, this phishing attack started spreading rapidly between 2024 and 2025. Hackers created fake websites, which looked completely professional and real. Fake security alerts were shown on these websites, which made the user think that their device had been hacked. When the user entered the Windows username and password, the hackers would get the information.

The web page was frozen by inputting code on the site, which made the user think that their system had been blocked. These fake websites were hosted on Microsoft's Windows.net platform, which made it seem like a real website to the users. To avoid identification, hackers used to update these websites frequently and avoid the investigation of security experts by using CAPTCHA verification.

New threat for Mac users

After Microsoft added anti-scareware protection to its Edge browser and released similar updates of Google Chrome and Mozilla Firefox, such attacks on Windows users were reduced by 90%. Now, hackers have focused on Mac users, and although their method is almost the same, some changes have been made in it. Fake websites and codes have been modified keeping Mac users in mind. These websites are still hosted on the Windows.net domain, which helps them appear legitimate.

Disclaimer: This content has been sourced and edited from Amar Ujala. While we have made modifications for clarity and presentation, the original content belongs to its respective authors and website. We do not claim ownership of the content.

© Copyright @2025 LIDEA. All Rights Reserved.