5 • 1.2K Ratings
🗓️ 17 December 2025
⏱️ 13 minutes
🧾️ Download transcript
Today, let’s go through one of the best, most convincing Apple scams that’s out there right now. This one really has it all: a genuine request to authenticate your identity coming from Apple, real alerts being sent to your phone, computer, and tablet, as well as perfectly timed phone calls coming from “Apple Support.” This scam is good enough to be able to trick even extremely skeptical people—so let’s go through it together so that you don’t get scammed.
Click on a timestamp to play from that location
| 0:00.0 | Today, let's go through one of the best, most convincing Apple scams that's out there right now. |
| 0:06.7 | This particular scam really has it all. It has a genuine request with a real support ticket coming from Apple themselves. |
| 0:13.9 | It has real alerts coming to your phone, your computer, and your tablet, as well as perfectly timed phone calls coming from someone who claims to |
| 0:21.7 | be Apple support. This scam, it's really good enough to trick even extremely skeptical people, |
| 0:27.3 | and so today, let's go through it so that you don't get scamp. And of course, if you appreciate |
| 0:32.3 | content like this, and if you want this content to reach ever more people so that they don't |
| 0:36.4 | get scammed, please do smash those like and subscribe buttons, which will force the YouTube algorithm |
| 0:41.0 | to pick the episode up and share it to ever more people. Thank you very much. So to start with, |
| 0:44.9 | the overview of how this scam works comes to us from a man by the name of Eric Moray. He is a product |
| 0:51.3 | manager over at Broadcom Software in Silicon Valley. |
| 0:54.9 | And on Wednesday, November the 12th, he became the victim of this very sophisticated scam, |
| 1:00.6 | and he later went on to detail his experience in an article titled, quote, |
| 1:05.0 | I almost lost my Apple account to the most sophisticated fishing attack I've ever seen, |
| 1:10.2 | how scammers weaponized Apple's own support |
| 1:12.5 | system to bypass two-factor authentication and how I barely escaped. Now, if you want to read his |
| 1:18.1 | original account, I will throw a link to his article. You can find it down in the description box below. |
| 1:23.6 | However, what I did is I converted his experience into a visual timeline that we can look and track together how the whole thing progressed over time. |
| 1:31.0 | Now, the whole thing began at 3.17 p.m. with what we call the setup. |
| 1:35.3 | It came in the form of a text message. |
| 1:37.3 | Basically, it was one of those two-factor authentication text messages that you receive when you're using a new computer to log into your |
| 1:44.8 | bank account or some other account and it sends you a six-digit code and it tells you not to |
| 1:49.9 | share that code with anyone. Now, once Eric received that text message, he found it strange, |
... |
Transcript will be available on the free plan in 5 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from The Epoch Times, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of The Epoch Times and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2026.