Steering Clear from “Apple Mobile Promo Draw” Phishing Scams

‍Phishing scams have evolved over the years, and cybercriminals have become more cunning in their tactics. A common hoax that has been making rounds recently is the “Apple Mobile Promo Draw” email scam. This article delves into the details of this scam, providing a comprehensive guide to help you identify and steer clear from such malicious threats.

Understanding the “Apple Mobile Promo Draw” Scam

The “Apple Mobile Promo Draw” is a sophisticated phishing scam that leverages the trusted name of Apple Inc, one of the world’s leading tech companies, to lure unsuspecting individuals into giving out their personal information.

This scam operates under the pretense of a promotional draw, which claims that the recipient’s phone number was randomly picked, making them entitled to a whopping cash prize of 750 thousand USD.

Anatomy of the “Apple Mobile Promo Draw” Scam Email

The scam email is typically titled “Win 750000.00” or something similar. The body of the email mentions a supposed anniversary celebration of “APPLE MOBILE Telecommunication,” where a total of 91 million USD has been allocated for gifts and cash prizes.

To claim the alleged winnings, the email prompts the recipient to complete a verification form, asking for vital information such as full name, sex, age, occupation, marital status, address, country, mobile number, and even an alternative email address. They are also instructed to attach a scan of their passport, driver’s license, or work ID.

Threat Summary:

  • Name: “Apple Mobile Promo Draw” phishing email
  • Threat Type: Phishing, Scam, Social Engineering, Fraud
  • Fake Claim: Recipient has won 750 thousand USD
  • Disguise:Apple Inc.
  • Symptoms: Unauthorized online purchases, changed online account passwords, identity theft, illegal access of the computer.

Unfortunately, all the claims made by the “Apple Mobile Promo Draw” email are false, and it is in no way associated with Apple Inc. or any other legitimate entities.

With the information targeted by this email, the cybercriminals behind it can potentially steal the victims’ identities, which they can then use to craft exceedingly personalized and convincing scams.

Recommended Antispam tool:

Try MailWasher

Email security is the first line of defense against ransomware viruses. To do this, we recommend that you use MailWasher. MailWasher blocks ransomware viruses coming through spam and phishing, and automatically detects malicious attachments and URLs. In addition, malicious messages can be blocked even before the recipient opens them. Since the main source of the spread of ransomware viruses are infected emails, antispam significantly reduces the risk of a virus appearing on your computer.

Download MailWasher

Potential Consequences of Falling for the Scam

Victims of scams like the “Apple Mobile Promo Draw” can face severe privacy issues, significant financial losses, and identity theft. Therefore, if you have already disclosed your personal information to scammers, it is crucial to immediately contact the appropriate authorities.

How Spam Campaigns Infect Computers

Spam campaigns can distribute malicious files as attachments or download links. These files can be executables (.exe, .run, etc.), archives (ZIP, RAR, etc.), documents (PDF, Microsoft Office, Microsoft OneNote, etc.), JavaScript, and so forth.

When a virulent file is executed, run, or otherwise opened, the infection chain (i.e., malware download/installation) is triggered. For example, Microsoft Office documents infect systems by executing malicious macro commands, while infectious OneNote files require users to click on embedded files/links.

Preventing Installation of Malware

It is strongly advised to treat incoming emails, DMs/PMs, SMSes, and other messages with caution. Attachments or links present in suspicious or irrelevant mail must not be opened, as they can be malicious.

It is also recommended to use Microsoft Office versions released after 2010, as they have the “Protected View” mode that prevents automatic macro execution.

While browsing, be careful as fraudulent and dangerous online content usually appears ordinary and harmless.

All downloads should be performed from official and trustworthy channels. It is equally important to activate and update programs by using legitimate functions/tools, as illegal activation tools (“cracks”) and third-party updaters may contain malware.

Having a reputable anti-virus installed and kept up-to-date is paramount for device/user safety. Security software must be used to run regular system scans and to remove detected threats/issues. If you’ve already opened malicious attachments, we recommend running a scan with a legitimate antivirus software to automatically eliminate infiltrated malware.

How to Spot a Malicious Email

Here are some tips to help you identify a phishing email:

  • Check the sender’s (“from”) email address: Hover your mouse over the “from” address and check if it’s legitimate. For example, if you received an email from Microsoft, be sure to check if the email address is and not something suspicious like,, or
  • Check for generic greetings: If the greeting in the email is “Dear user”, “Dear”, “Dear valued customer”, this should raise suspicion. Most companies address you by your name.
  • Check the links in the email: Hover your mouse over the link presented in the email. If the link that appears seems suspicious, don’t click it.
  • Don’t blindly trust email attachments: It is a good idea to scan any email attachments with an antivirus application.

What to Do If You Fall for an Email Scam?

If you’ve fallen victim to an email scam, here are some steps to take:

  • Change your password: If you clicked on a link in a phishing email and entered your password, change your password as soon as possible.
  • Contact your bank: If you entered your credit card information, contact your bank as soon as possible and explain the situation.
  • Report identity theft: If you see any signs of identity theft, you should immediately contact the appropriate authorities.
  • Scan your computer: If you opened a malicious attachment, your computer is probably infected. You should scan it with a reputable antivirus application.


The “Apple Mobile Promo Draw” scam is a stark reminder of the ever-evolving landscape of cyber threats. It underscores the need for continuous vigilance and a proactive approach towards maintaining online safety. By staying informed and practicing safe online behaviors, you can significantly reduce your risk of falling victim to such scams.

Leave a Reply

Your email address will not be published. Required fields are marked *