Categories: News

New phishing-as-a-service campaign sinks its teeth into iMessage

A new phishing-as-a-service campaign is sinking its teeth into iMessage.

The PhaaS named “Darcula” is using 20,000 domains to spoof brands and steal credentials from Android and iPhone users in more than 100 countries and across sectors from airlines to utilities. The phishing kit offers 200 phishing templates to use for spoofing brands, showing high-quality landing pages with correct branding and all. 

This vampire-reminiscent campaign is unique in that it uses iMessage and Rich Communication Services (RCS) to send texts – using this method over SMS allows messages sent through the platform to bypass SMS firewalls and can prevent detection of suspicious messages.

Apple security company Jamf’s vice president of Portfolio Strategy, Michael Covington, says he’s not surprised by the approach, however. He notes that because RCS is so widely trusted by users, it has become a perfect attack vector for hackers. 

Here’s what Covington says in a statement to Apple World Today: RCS is an alternative messaging protocol that offers a more feature-rich and interactive messaging experience than traditional SMS. In addition to supporting more characters in each transmission, RCS offers modern enhancements like read receipts, typing indicators, and high-resolution media. From a security perspective, RCS also provides end-to-end encryption, offering a more secure and private messaging experience.

For several years, we have seen attackers exploit modern messaging platforms, like iMessage and WhatsApp, to launch phishing campaigns, so we are not surprised to see RCS added to the list of potential attack vectors. These encrypted services are often considered by end users to be more secure, so there is some inherent trust that is often not present with basic SMS messaging. That said, we believe the benefits of end-to-end encryption and the modern messaging features are worthy upgrades from more outdated communication protocols where privacy is at risk.

Regardless of which messaging protocol or service a user prefers, they should always have their guard up, ready to spot a potential social engineering attack. Hackers are constantly evolving their techniques and the advancements we see in phishing services like Darcula show that nothing is off limits. Everything from the sender, the brand names used within a message, and the messaging protocol itself should be questioned and verified before parting with sensitive information like sensitive credentials.

Dennis Sellers

Dennis Sellers is the editor/publisher of Apple World Today. He’s been an “Apple journalist” since 1995 (starting with the first big Apple news site, MacCentral). He loves to read, run, play sports, and watch movies.

Recent Posts

Future Mac laptops could use an Apple Pencil as an input device

Apple has filed for a patent for a “Mountable Tool Computer Input” that hints that…

2 hours ago

New report says John Ternus is likely Tim Cook’s successor (not that the current CEO is expected to leave anytime soon)

A report says John Ternus is likely Tim Cook’s successor (not that the current CEO…

2 hours ago

Apple’s iPhone sales in the U.S. were flat in the first quarter

Apple’s iPhone sales in the U.S. were flat in the first quarter

2 hours ago

Twelve South’s BookArc Flex is a functional, classy stand for using your Mac laptop when the lid is closed

Twelve South’s BookArc Flex is a functional, classy stand for using your Mac laptop when…

3 hours ago

How to Automate Your Payment Processing Workflows

Manual payment processing workflows are an impediment to the smooth running of a business nowadays. 

3 hours ago

Today’s deal: AdGuard Family Plan Lifetime Subscription only $24.97

Today’s deal: AdGuard Family Plan Lifetime Subscription only $24.97.

4 hours ago