Apple Event: May 7th at 7 am PT

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Is this a scam?

The following URL looks like it implements spy ware and the like (that would not be safe for a mac).


****************



Notice that "apple.com" is actually the subdomain. They tried to find a clever way to trick you with that. But the main directory is open (and you can see a robot code listed as the top file). Correct me if I am wrong, here. But this seems like a red flag.


http://apple.com----macupdate.info/


<Link Edited by Host>

iMac, iOS 8.4.1, using safari

Posted on Aug 29, 2015 9:05 AM

Reply
9 replies

Aug 29, 2015 1:56 PM in response to hat_tip77

Websites in general have become saturated with advertising, and scam roll-over links that pop dialogs trying to get you to take action to install anti-virus, anti-malware, and so-called Mac cleaner applications — all of which put your Mac at risk. Don't click any of them. Continue to use common sense.


Certainly, one of these is the dialog that tells you that you have a virus/malware/something nasty, and call a certain phone number, or click a button. On OS X, ignore all of these fake dialogs, and force quit (option-command-esc) Safari. Press the shift-key while relaunching Safari, and on the Mavericks or earlier Safari menu, Choose Reset Safari, check everything, and click Reset. On Yosemite, select Clear History and Website Data… choose All History, and click Clear History button.


Remember, Apple will not pop any dialogs in Safari unless your Adobe Flash browser plug-in is out of date. As there is a scam that is also popping an official looking Adobe Flash dialog, simply ignore both. Visit System Preferences : Flash Player, click on its Update tab, and click the Check Now button. It will inform you if there is an actual Flash update available or not.

Aug 30, 2015 6:19 AM in response to hat_tip77

Sweet! I mean, thanks for all the information. So, I take it the code used to elicit these actions is not the same as that implemented by "spy ware"... Eh, doesn't really matter anyway. I think your last post kind of sums up what I was thinking anyway. You just communicated it better. And I wanted to make sure that I wasn't miss-using a word. That's all. But if anyone else reads this thread, that info might help them too. Thank you again. It SHOULD all be common sense. Yet, lots of people fall for these things... so, by virtue of what I think the term "common" tends to mean... *cough* *cough* Any ways... thanks! 😁

Sep 2, 2015 2:49 PM in response to hat_tip77

The clever attackers use Javascript to display something different for the hover and when you click, or use chains of links and/or link shorteners and who knows where those go, or use — as recently arose with a bogus electronicfrontierfoundation domain used for spearphishing — legitimate-looking domains that aren't.

Use a plugin blocker. Or remove Adobe Flash Player. YouTube doesn't need it anymore, and it's a common source of vulnerabilities. Remove Oracle Java, or minimally disable the web start on all but the site(s) you really need to use Java with.


In general, "Spyware" and "Adware" and such are present on your system. That usually happens if you've installed the stuff — possibly as part of cracked software, some toolbar, or a package that's been "wrapped" as part of a download site — or if somebody else has had physical access, or if some network-accessible component of OS X has had a vulnerability.

Also ensure Gatekeeper is set to allow signed apps and App Store apps.

Don't install anything you didn't go looking for, and only install from the original source and not from a download site or aggregator.

Cracked software and torrented software often intendsto crack your local security, too.


Etc...


The difficulty encountered with OS X, Windows and other platforms — and with web browsers and the rest — is that end-user are often not familiar with computer security, but are increasingly expected to be, and are increasingly expected to manage their own systems and access and backups. IT has gotten vastly simpler and in ways I never expected, but it's still not simple. Both the attacks and the defensive recommendations are evolving, too. Tools like Xprotect and Gatekeeper might help, but it's just as easy to load some anti-malware tool that can end up making the system unstable or — as has happened — opens up additional paths for remote attacks.

Sep 2, 2015 3:05 PM in response to MrHoffman

I generally don't download anything unless it is either licensed by Apple or has already been used by a number of my friends (who give good feed back and directions). I don't bother with things like gatekeeper. I just use the advanced security settings in the OS (firewall, limits on data and file sharing, passwords in every available text field that may require a 'key'). I keep an eye on my cache folders and empty them regularly. The ones that help the OS function repropigate on their own. I also clear the histories a lot. And check certification trust settings. The JavaScript, however, I am less familiar with. So that part was very helpful. I had an incredibly hard time trying to understand it in high school. So thank you for putting it in words that I could comprehend.

Is this a scam?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.