Morning Overview

Apple iCloud scam email targets iPhone users, report warns to delete it

A phishing campaign targeting iPhone users with fake iCloud storage warnings has prompted fresh alerts from security experts and government agencies in spring 2026. The scam emails claim that a recipient’s iCloud account is full or has been blocked, then threaten to permanently delete photos, videos, and documents unless the user clicks a button to “upgrade.” The goal is simple: steal Apple ID login credentials.

A report from The Guardian detailed the mechanics of the scheme, which follows a two-stage pattern. First, a target receives an email with a subject line referencing iCloud storage capacity, warning that space is nearly exhausted. A second, more aggressive follow-up claims the account has been blocked entirely and sets a specific date for file deletion. Both messages push the reader toward a single button that leads to a fraudulent website designed to look like an Apple login page.

How the scam works

The emails mimic Apple’s visual branding closely enough to pass a quick glance. Logos, fonts, and layout mirror legitimate iCloud notifications. But the sender address and the destination URL behind the “upgrade” button do not belong to Apple. Clicking through and entering an Apple ID and password hands those credentials directly to the attacker. According to the FTC’s description of how phishing attacks operate, compromised credentials can potentially expose cloud-stored files, saved payment methods, and other services linked to the affected account.

The technique is a textbook example of what the Federal Trade Commission classifies as phishing: spoofed branding, artificial time pressure, and links engineered to capture sensitive data. The FBI’s guidance on spoofing and phishing adds that attackers frequently register domains nearly identical to legitimate company URLs, sometimes swapping a single character or tucking the real brand name into a subdomain. The bureau advises recipients to examine email addresses and URLs carefully and to look up company contact information independently rather than trusting anything supplied in the message.

Why this version is effective

What separates this campaign from a routine password-reset phish is the emotional leverage. Threatening to erase someone’s family photos and personal videos on a named date creates a jolt of panic, and panic is the enemy of skepticism. A person worried about losing years of memories is far less likely to pause and inspect the sender’s email address or hover over a link before clicking.

Apple-themed phishing is not new. A state advisory from Massachusetts documented earlier campaigns that used Apple branding to trick users into surrendering credentials, and it confirmed Apple’s official reporting channel for suspicious emails: [email protected]. But the shift toward iCloud storage threats appears to be a deliberate escalation, swapping a relatively abstract “verify your account” pretext for something that feels immediate and irreversible.

No government agency has published victim counts or financial loss figures specific to this iCloud storage variant as of May 2026. The FTC and FBI provide general phishing guidance and reporting channels but have not released data quantifying the reach of this particular wave. Apple has not issued a public statement addressing the campaign’s scope or describing any specific countermeasures, though its [email protected] address remains active and is referenced in multiple government advisories.

How to spot the fake emails

Several red flags can help users identify these messages before any damage is done:

  • Sender address: Legitimate Apple emails come from domains like @apple.com or @icloud.com. Scam versions often use lookalike domains with extra characters, misspellings, or unrelated top-level domains.
  • Urgency and threats: Apple does not threaten to delete your files by a specific date in an email. Any message that sets a countdown or deadline for data loss should be treated as suspicious.
  • Generic greetings: Phishing emails frequently open with “Dear Customer” or “Dear iCloud User” rather than your actual name.
  • Suspicious links: Hovering over (or long-pressing on mobile) any button or link in the email will reveal the actual destination URL. If it does not point to apple.com, do not click.

What to do if you receive one

The steps are straightforward: do not click any links or buttons in the email, do not reply, and delete the message. If you have already clicked a link and entered your Apple ID credentials, change your password immediately. Go to Settings > [Your Name] > Sign-In & Security on your iPhone to update your password and enable two-factor authentication if it is not already turned on. Two-factor authentication adds a secondary verification step that can block an attacker even if they have your password.

To check your actual iCloud storage status without any risk, open Settings > [Your Name] > iCloud > Manage Account Storage on your device. This confirms whether your storage is genuinely running low and lets you manage it directly through Apple’s ecosystem, bypassing any chance of landing on a spoofed page.

Reporting matters, too. The FTC accepts scam reports through ReportFraud.ftc.gov, the FBI takes complaints via the Internet Crime Complaint Center, and Apple asks customers to forward suspicious messages to [email protected]. Those reports help authorities and companies track emerging tactics and build cases against the groups behind them.

Verify before you trust any email about your account

Until law enforcement or Apple releases concrete data on this campaign’s reach, the clearest guidance is also the simplest: treat any unsolicited email claiming your iCloud storage is about to trigger mass deletion as a scam until proven otherwise. If the message makes you anxious, that anxiety is the point. Step away from the email, open your iPhone settings, and check for yourself. Your photos are almost certainly fine. Your login credentials are what is actually at risk.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.