Submitted by Quick_Abbreviations4 t3_1137253 in iphone
DarkNet-Magic t1_j8p4rx9 wrote
Reply to comment by elementaldelirium in Is this mail from the REAL Apple? by Quick_Abbreviations4
It varies by how the programmer sets up the phishing link (there are also tons of templates scammers can grab online to make basic phishing links as well). But the way it works in most cases, is once you click on the phishing link, it then directs the code to open the application they are attempting to grab the credentials for. Once it opens the target application, it uses the credentials saved in the application (like when you open the application and it is automatically signed in), it then shoots those credentials (email and password) back to the scammer in a .txt file.
These guys literally get incredibly long lists of emails and passwords for the application they are targeting, go through and access those accounts so they can have access to your saved financial information, steal it, or use it to send themselves money.
Viewing a single comment thread. View all comments