New iPhone scam tricks owners into giving away phones
NEWNow you can listen to News articles!
Getting a new iPhone should be a time you enjoy. You open the box. You turn it on. Everything feels safe. Unfortunately, scammers also know that time.
In recent weeks, we’ve heard from several people who received unexpected phone calls shortly after activating a new iPhone. The callers claimed to be from a major carrier. They said a shipping error was made. They insisted that the phone needed to be returned immediately. One message stood out because it shows exactly how convincing and aggressive this scam can be.
“Someone called me (the call said it was from Spectrum) and told me that they had shipped the wrong iPhone and needed to replace it. I had to tear the label off the box, tape it, and place it on my porch steps. FedEx was going to pick it up and they would put a label on it. And just for my trouble, they would send me a $100 gift card! The guy was too eager, though. He called me again at 7 a.m. to make sure I would follow his instructions. Right after After After that, I picked up my box on the stairs and called Spectrum who confirmed that it was a scam. There are no refurbished i17 phones because they are new. I called the guy, said a few words and hung up on him. They have called at least twice about the same thing.
– Kris L, Columbus, Montana
That second morning call was the revelation. Pressure is the scammer’s favorite tool.
Sign up to receive my FREE CyberGuy report
Get my best tech tips, urgent security alerts, and exclusive offers delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Guide to Surviving Scams, free when you join me CYBERGUY.COM information sheet.
HOLIDAY DELIVERIES AND FAKE TRACKING TEXTS: HOW SCAMMERS TRACK YOU

Scammers often attack immediately after purchasing a new iPhone, using urgency and fake calls from the carrier to catch you off guard before you have time to check. (Kurt “CyberGuy” Knutsson)
How the new iPhone replacement scam works
This scam depends on time and pressure. First of all, criminals target people who recently bought a new iPhone. That information often comes from data broker sites, leaked purchasing data, or marketing lists sold online. Scammers then spoof an operator’s phone number. As a result, the call appears legitimate. They seem confident and knowledgeable because they already know the device model you requested.
Once the call starts, the story moves quickly. The scammer claims there was a shipping error. They then insist that the phone must be returned immediately. To reinforce the urgency, they say that a messenger has already been scheduled. If you follow the instructions, you will receive a new iPhone. At that moment, the device disappears. The scammer resells it or dismantles it into pieces. When you realize something is wrong, you are unlikely to recover.
Why this scam seems so credible
This scam copies real customer service processes. Carriers send replacement phones. FedEx handles returns. Gift cards are often used as apologies. Scammers combine those facts and add urgency. They count on you to act before verifying. They also rely on a risky assumption: that a phone call that seems real must be real.
REAL APPLE SUPPORT EMAILS USED IN NEW PHISHING SCAM

By spoofing trusted phone numbers and learning details about your device, criminals make these calls seem real enough to force you to act quickly. (Kurt “CyberGuy” Knutsson)
Warning signs that reveal this scam
Once you know what to watch for, the warning signs will be clear.
• Unsolicited calls about returns you did not request
• Pressure act fast
• Instructions leave a phone outside
• Promises gift cards for cooperation
• Follow-up calls to hurry you
Legitimate carriers do not handle returns this way.
THE FAKE REFUND SCAM: WHY SCAMMERS LOVE VACATION BUYERS

Once a phone is delivered, it is typically resold or disassembled into pieces, leaving victims with no device and little chance of recovery. (Kurt “CyberGuy” Knutsson)
Ways to stay safe from iPhone return scams
Protecting yourself starts by slowing things down. Scammers rely on speed and confusion. You win by pausing and checking.
1) Never return a device based solely on a phone call
Hang up and contact the carrier using the number listed on your invoice or on the official website. If the problem is real, they will confirm it.
2) Do not leave electronic devices outside to pick them up.
Legitimate returns use tracked shipping labels linked to your account. Operators do not ask you to leave phones on porches or in doorways.
3) Be skeptical of urgency
Scammers rush you on purpose. Pressure prevents careful thinking. Any demand for immediate action should raise concern.
4) Use a data removal service
Scammers often know which phone you bought because your personal details are widely available online. Data removal services help reduce your exposure by removing your information from data broker sites that criminals trust. While no service can guarantee complete removal of your data from the Internet, a data deletion service is truly a smart choice. They are not cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically deleting your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to delete your personal data from the Internet. By limiting the information available, you reduce the risk of scammers cross-referencing leak data with information they can find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already available on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already available on the web: Cyberguy.com.
5) Install powerful antivirus software
Powerful antivirus software adds another layer of protection. Many antivirus tools help block scam calls, warn about phishing links, and alert you to suspicious activity before damage is done.
The best way to protect yourself from malicious links that install malware and potentially access your private information is to have powerful antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.
Get my picks for the best antivirus protection winners of 2025 for your Windows, Mac, Android, and iOS devices at Cyberguy.com.
6) Save messages and call details.
Keep voice messages, phone numbers and time stamps. This information helps operators warn other customers and detect repeat scams.
7) Share this scam with others
Criminals reuse the same script over and over again. A quick warning to friends or family could stop the next victim.
Kurt’s Key Takeaways
Scams targeting new iPhone owners are becoming more targeted and aggressive. Criminals time their calls carefully and copy the operator’s real language. The simplest defense is still the one that works best. Check before acting. If a call puts pressure on you to hurry up or hand over a device, pause and contact the company directly. That one step can save you hundreds of dollars and a major headache.
If an operator called you tomorrow claiming an error with your new phone, would you check it first or would urgency take over? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE News APP
Sign up to receive my FREE CyberGuy report
Get my best tech tips, urgent security alerts, and exclusive offers delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Guide to Surviving Scams, free when you join me CYBERGUY.COM information sheet.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning technology journalist with a deep love for technology, gear and devices that improve lives with his contributions to News and News Business since mornings on “News & Friends.” Do you have any technical questions? Get Kurt’s free CyberGuy newsletter, share your voice, a story idea or comment on CyberGuy.com.


