Smashing Security

This clever scam nearly hijacked a tech CEO's Apple ID

27 snips
Mar 19, 2026
Paul Ducklin, experienced cybersecurity commentator, breaks down a near-miss Apple ID takeover that used MFA fatigue, real-looking Apple alerts, a convincing support call, and a pixel-perfect phishing page. He also explores privacy risks in medical data sharing with UK Biobank and how small data points can re-identify people. Plus a quirky look at human-powered “AI” and a satirical RSA punishment.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Why MFA Fatigue Works Like A Denial Of Service

  • MFA bombing exploits human frustration by flooding approval prompts until a user finally taps accept.
  • The technique is effectively a denial-of-service against a user's attention, increasing the chance of a mistaken approval.
ANECDOTE

Scammers Used Real Apple Support Workflow To Lend Credibility

  • Attackers phoned using Apple's real support workflow to generate authentic case ID emails that landed in Matt's inbox.
  • The SMS link led to audit-apple[...] domain and a convincing fake page with the real case ID and fake chat transcript.
INSIGHT

Pixel Perfect Phishing Is Cheap And Effective

  • Pixel-perfect phishing sites are trivial to create using open-source tools and can perfectly mimic legitimate sites.
  • The only technical difference is where submitted credentials are sent, making detection hard for victims.
Get the Snipd Podcast app to discover more snips from this episode
Get the app