Apple Pay has quickly become one of the most popular digital wallets in the United States, handling billions of dollars in transactions every year. Surveys show that more than half of iPhone users rely on Apple Pay at least once a week — and scammers have taken notice. Reports of Apple Pay scams have grown alongside its use, from fake text alerts about purchases to con games on online marketplaces. Because payments via Apple Pay and Apple Cash are instant, mistakes are costly and often irreversible. Knowing how these scams work and how to spot them is the best protection, so let’s look at the most common schemes and what you can do to avoid them.
Lukas Grigas
September 25, 2025
Apple Pay is considered secure, but that doesn’t mean users are safe from scams. The service is built with protections like biometric recognition (Face ID or Touch ID), tokenization that hides your real card number, and the option to freeze Apple Pay through Find My iPhone if your device is lost. These tools make it very difficult for anyone to break into Apple Pay directly.
Yet the number of scam reports keeps rising. The reason is simple: criminals don’t hack Apple Pay, they hack people. They send false purchase alerts, pose as Apple Support, or create convincing traps on online marketplaces. Since money sent via Apple Pay or Apple Cash moves instantly — and the service doesn’t offer buyer protection for personal transfers — victims often discover there is no way to undo the payment.
So will Apple Pay refund money if scammed? It depends. If a criminal makes an unauthorized transaction with your card, your bank or card issuer may reimburse the charge under fraud protection rules. But if you were convinced to approve a transfer yourself, the money is far harder to recover. This is why fraudsters prefer Apple Pay: It’s widely trusted, fast, and hard to unwind once the money has moved. Strong habits remain the most effective form of Apple Pay scam protection.
The result is a system that’s technologically strong but vulnerable to human manipulation. To see why so many people still fall victim to fraudsters, it’s worth looking at how Apple Pay scams actually unfold — and who scammers target most.
An Apple Pay scam might begin with a simple text message that looks like it came from Apple, a phone call from someone claiming to be Apple Support, or even a fraudulent store posing as an Apple-affiliated business. Each approach is designed to push the target into trusting the scammer enough to hand over personal information, approve a payment, or click a malicious link, all of which can lead to serious consequences that go beyond lost funds, such as identity theft.
Apple Pay scams are most effective in environments where caution slips. On public Wi-Fi, for example, attackers can stage convincing fake login screens or redirect you to look-alike websites. Pair that with a message that sounds urgent — “Your Apple ID is locked” or “Unfamiliar Apple Pay transaction detected” — and many people take action without stopping to check whether they’re using the correct service.
Certain groups are especially appealing targets. Older adults may be less familiar with digital payments, sellers on online marketplaces are often eager to complete a deal, and anyone quick to respond to alerts is vulnerable to pressure. Falling for one of these scams can result in instant losses via Apple Pay or Apple Cash — and because Apple Pay doesn’t offer buyer protection for personal transfers, those funds are rarely recovered. Beyond the immediate hit, these scams can damage your financial reputation and even put your good credit score at risk.
That combination of strong technology and human vulnerability explains why scam activity around Apple Pay keeps growing. It isn’t one tactic but a shifting set of ploys, all designed to take advantage of urgency and trust. Because scammers keep inventing new angles, it helps to know the most common tricks in circulation — the ones you’re most likely to see in your own inbox or phone.
In the Apple Pay support scam, criminals pretend to be Apple’s customer service and warn that your account is in trouble. The call or text looks legitimate and usually mentions an unfamiliar Apple Pay transaction or a locked Apple ID. The scammer pressures you to share verification codes, provide card details, or even send money via Apple Pay to “cancel” the charge. Once you comply, the scammer either drains your account or gains access to your Apple ID. Older adults are frequently targeted in these scams, and U.S. consumer agencies report thousands of dollars lost to this scheme every year.
In the 2FA request scam, fraudsters trigger an Apple ID password reset and then contact you pretending to be Apple Support. They claim the code you received by text or email is needed to “secure” your account from a suspicious Apple Pay transaction. In reality, that code is the key that lets them reset your password and take over your account. Once inside, scammers can approve charges, add their own devices to Apple Pay, and drain linked cards. This scheme is particularly dangerous because it requires no malware — only a moment of misplaced trust. Victims are often people unfamiliar with Apple’s 2FA process, and sharing a single six-digit code can result in full account compromise.
In the overpayment scam, criminals target sellers on Craigslist, Facebook Marketplace, and other online platforms. The scammer agrees to buy an item and then claims to have “accidentally” sent too much money through Apple Pay. To back up the story, they provide a forged Apple Pay receipt showing a pending transaction. The target is asked to “refund” the difference through another payment method. In reality, no money was ever received, or the transfer was made with a stolen credit card that will later be reversed. Sellers who comply end up losing hundreds of dollars. This Apple Pay transaction scam is common on marketplaces and thrives on people’s eagerness to complete sales quickly.
In the fake Apple Pay receipt scam, criminals send doctored emails or Wallet screenshots to “prove” they paid for an item. The screenshot usually shows a recent Apple Pay transaction marked as “pending” or “processing,” with an Apple Store-style logo to look official. Targeted individuals are pressured to ship goods or click a link to “accept” the payment — but Apple Pay doesn’t work this way. If the money isn’t visible in your Wallet or bank, it isn’t there. This scam is common on online marketplaces like Craigslist and Facebook Marketplace, where private sellers are less experienced with Apple Pay scam protection. Because transfers via Apple Pay and Apple Cash are instant, once they send the item, recovery is nearly impossible.
In the Apple Pay romance scam, fraudsters build trust through dating apps or social media, posing as potential partners. After weeks of conversation, they claim to face an emergency — like needing money for travel, medical bills, or urgent expenses. They then ask the victim to send funds via Apple Pay or Apple Cash because transfers are instant and appear simple. Once the money is sent, the scammer either asks for more or disappears altogether.
In the Apple Pay phishing scam, fraudsters send emails that look like official Apple messages. These often warn about an “unauthorized Apple Pay transaction” or a suspended Apple ID, urging you to click a link to resolve the issue. The link leads to a spoofed site that mimics Apple’s login page designed to trick you into entering your Apple ID, password, and sometimes card details. Once stolen, this information can be used for identity theft or to authorize fraudulent purchases. Because emails are easy to fake and widely distributed, this scam is common and dangerous — especially for older adults who may not scrutinize sender addresses or formatting.
In the Apple Pay public Wi-Fi scam, criminals exploit unsafe connections to trick users into giving up their credentials. When you connect to unsecured public Wi-Fi, attackers can redirect you to fake Apple Pay sign-in pages or insert pop-ups warning about suspicious Apple Pay transactions. These screens look convincing, showing the Apple logo and requesting your Apple ID, password, or even card details to “restore access.” If you enter this data, you might face identity theft or unauthorized charges. Because many people use coffee shop or airport Wi-Fi for sensitive transactions, this scam is both common and highly effective.
In online marketplace scams, criminals exploit platforms like Craigslist or Facebook Marketplace by posting non-existent items for sale. The listing looks genuine, often using stolen product photos and attractive prices. Once a buyer shows interest, the scammer insists on payment via Apple Pay or Apple Cash, claiming it’s “fast and secure.” After the money is sent, the seller vanishes — there is no product, no shipment, and no way to get the payment back. Because Apple Pay doesn’t offer buyer protection for person-to-person transfers, victims are left without both the money and the item. This scheme frequently targets bargain-hunters and older adults less familiar with how Facebook Marketplace scams work.
In the Apple Pay gift card scam, targeted people are pressured to buy Apple gift cards and send photos of the numbers on the back as payment for fake debts, fines, or services. Scammers often pose as tech support agents, government agencies or officials, or even relatives in trouble. Once the codes are shared, the money is gone instantly, and there is no way to reverse the transaction. Older adults are heavily targeted because they may be less familiar with how gift cards work, making this one of the most common and damaging frauds tied to Apple products.
In the Apple Pay prize and lottery scam, targeted individuals are told they’ve won a prize — often a large sum of money or electronics — but must first pay taxes or fees via Apple Pay or Apple gift cards. The prize never exists, and once the payment is sent, the scammer vanishes. These scams are particularly effective with older adults who are more likely to trust letters, texts, or emails promising winnings. They exploit both excitement and urgency, making victims act before questioning the request.
Scammers use different tricks, but most Apple Pay frauds share the same warning signs. Watch for these red flags before responding to any call, text, or email:
If you see any of these signs, pause before acting. Confirm through Apple’s official channels rather than responding to the message directly.
If you’ve already responded to a suspicious message or approved a transfer, move fast. Acting quickly can make the difference between losing a little and losing a lot.
While it’s often difficult to get money back after an Apple Pay scam, these steps are the best way to limit damage, improve your chances of recovery, and strengthen your Apple Pay scam protection going forward.
Reporting an Apple Pay scam is an important step in protecting your money and identity — and it helps others avoid the same traps. Here’s how to report scams to Apple, your bank, and the authorities:
Apple Pay users that wish to avoid getting scammed, should focus on prevention as much as possible. This means setting up strong protections and knowing how to respond when something feels off. Here are specific steps you can take:
Apple Pay scams move quickly, and once money is gone, it’s usually gone for good. That’s why it’s so important to get early warnings and act quickly. NordProtect is designed to help with both.
NordProtect is an identity theft protection service that monitors your personal information and financial activity. If your email address, phone number, or Social Security number shows up in a data leak, you’ll receive an alert. If someone tries to open a new credit account in your name, NordProtect will notify you right away. And if there’s suspicious activity that could be linked to an Apple Pay scam, NordProtect’s security alerts and notifications will give you a chance to react before the situation gets worse.
Beyond alerts, NordProtect also provides recovery tools and financial coverage. If your identity is stolen, the service will help you restore it and cover eligible expenses. If you lose money in certain types of online fraud, NordProtect can reimburse up to US$10,000. And if a scam leads to more serious identity theft, coverage extends up to US$1,000,000 to support the recovery process.
Lukas is a digital security and privacy enthusiast with a passion for playing around with language. As an in-house writer at Nord Security, Lukas focuses on making the complex subject of cybersecurity simple and easy to understand.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.