Apple iMessage Phishing Campaign Ask Users to Disable Built-in Protection by Replying to Texts

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity & Streaming Writer

Apple iMessage users are manipulated into disabling the platform’s built-in phishing protection via phishing texts that impersonate entities such as USPS or toll collection agencies and ask receivers to reply. Once individuals follow the message’s directives, they become vulnerable to malicious links.

Apple iMessage has implemented a protection mechanism that automatically disables links in messages received from unknown senders, including both phone numbers and email addresses, to combat such attacks.

However, an Apple statement revealed a critical exception to this protection. If users respond to a malicious message or add the sender to their contact list, the links become re-enabled within the iMessage app, exposing the user to potential risks.

Apple iMessage phishing texts.
Apple iMessage phishing texts (Source: BleepingComputer)

Over the past few months, there has been a significant increase in smishing attacks that exploit this exception to bypass iMessage’s security measures. The messages invoke issues like a failed delivery or unpaid road toll, urging recipients to reply in order to enable any disabled links.

For example, one smishing message reads, "Please reply Y, then exit the text message, reopen the text message activation link, or copy the link to Safari browser to open it." These instructions are an intentional ploy to reinstate active links within the text message, undermining Apple’s anti-phishing defenses.

This deceptive tactic has reportedly been used for at least a year, with notable surges in activity observed this past summer. 

Threat actors capitalize on users' general familiarity with responding to text messages, particularly to opt out of subscriptions or confirm appointments by replying with "YES" or "STOP." This conditioned behavior makes it easier for unaware users to comply with these fraudulent prompts.

Clicking these re-enabled links can lead recipients to malicious websites that extract sensitive personal information, such as login credentials, credit card details, or other private data.

Alarmingly, even if users do not click on the links, merely replying confirms to the attackers that the recipient is an active target who responds to phishing attempts, thus increasing the likelihood of future attacks from similar threats.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: