Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Emails Target iOS Users with Fake AI Apps

Phishing Emails Target iOS Users with Fake AI Apps

Posted on March 6, 2026 By CWS

A recent phishing campaign has emerged, targeting iPhone users by impersonating trusted AI brands, ChatGPT by OpenAI and Google’s Gemini. The attackers are sending fraudulent emails to trick recipients into downloading counterfeit applications from Apple’s App Store.

Deceptive Tactics in Phishing Emails

This operation distinguishes itself by exploiting the credibility of well-known AI platforms. The malicious apps are not merely disguised as random utilities; they are wrapped in the guise of professional tools used by millions daily. Once downloaded, these applications harvest Facebook login credentials from unsuspecting users.

The attack initiates with emails crafted to mimic official communications from ChatGPT or Gemini. These messages, aimed at business users and marketers, present the fake apps as tools for advertising management or AI-powered business solutions.

Exploiting Trust in the App Store

The emails contain direct links to listings on Apple’s App Store, a platform users inherently trust. This trust is crucial to the campaign’s success, as few people question an app that appears properly listed on an official platform. SpiderLabs analysts uncovered two fraudulent apps: GeminiAI Advertising (id6759005662) and Ads GPT (id6759514534), both hosted in the Australian App Store.

Upon launching these apps, users are met not with AI functionalities but with a fake Facebook login screen, prompting them to enter their credentials. The attackers bypass genuine onboarding processes, creating a seamless illusion of legitimacy.

Implications of the Credential Theft

This campaign marks a notable shift in tactics among threat actors, who now infiltrate official marketplaces rather than relying on fake websites or malicious attachments. The appearance of these apps on Apple’s platform, even briefly, underscores the challenges of vetting every application in large-scale digital distribution systems.

The phishing scheme relies on a chain of trust established before users even open the fake apps. Emails purporting to be from recognized AI platforms set expectations of legitimacy, leading victims through multiple credibility checkpoints.

Protecting Against Phishing Attacks

Users receiving unsolicited emails promoting AI apps should verify the sender’s actual email address instead of relying solely on the display name. Checking developer names, reading user reviews, and scrutinizing app descriptions can reveal potential fraud. Enabling two-factor authentication on social media accounts adds a layer of protection.

Organizations should promote awareness of such phishing campaigns, encouraging employees to report suspicious emails, regardless of the impersonated brand’s familiarity.

Cyber Security News Tags:App Store, ChatGPT, credential theft, Cybersecurity, Facebook login, fake apps, Gemini, iOS apps, online security, Phishing

Post navigation

Previous Post: Iranian Cyber Group Targets US Organizations Amid Tensions
Next Post: Boost Cybersecurity with AI-Powered Risk Management

Related Posts

SesameOp Leveraging OpenAI Assistants API for Stealthy Communication with C2 Servers SesameOp Leveraging OpenAI Assistants API for Stealthy Communication with C2 Servers Cyber Security News
Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone Cyber Security News
AI Tools Misused for Stealthy Malware Communication AI Tools Misused for Stealthy Malware Communication Cyber Security News
\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant \Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant Cyber Security News
Microsoft 365 Services and Copilot Outage Hits Users in Japan and China Microsoft 365 Services and Copilot Outage Hits Users in Japan and China Cyber Security News
28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online 28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious Chrome Extension Targets Crypto Wallets
  • Pentagon’s AI Dispute with Anthropic Over Autonomy
  • OpenAI Unveils Codex Security for Software Vulnerabilities
  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious Chrome Extension Targets Crypto Wallets
  • Pentagon’s AI Dispute with Anthropic Over Autonomy
  • OpenAI Unveils Codex Security for Software Vulnerabilities
  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News