Hackers can access iCloud-locked iPhones using fake receipts and phishing kits


Hackers, Thieves, and Repair Shops Access iCloud-Locked iPhones, Here’s How

Hackers, thieves, and restore outlets have found a brand new solution to bypass the ‘Find My iPhone’ characteristic on iCloud-locked iPhones in order that they can promote stolen or non-stolen units, according to a report from Motherboard.

For these unaware, “Find my iPhone” is an app and service from Apple, which helps you to find, lock down or wipe your misplaced iPhone, iPad, iPod, or Macbook and requires a password to proceed. Apple had launched this characteristic in 2013 to safeguard folks’s info saved on their iPhones.

In order to maintain iPhones safe and make it much less precious targets to would-be thieves, iPhones can be related solely to 1 iCloud account at a time. This signifies that the hackers and thieves must determine a means out to take away the iCloud account from the iPhone in an effort to promote the stolen machine to another person or for somebody new to make use of it. The iCloud account can solely be eliminated by coming into the Apple ID password.

“The iCloud security feature has likely cut down on the number of iPhones that have been stolen, but enterprising criminals have found ways to remove iCloud in order to resell devices. To do this, they phish the phone’s original owners, or scam employees at Apple Stores, which have the ability to override iCloud locks. Thieves, coders, and hackers participate in an underground industry designed to remove a user’s iCloud account from a phone so that they can then be resold,” in accordance with Motherboard.

In order to get into iCloud-locked iPhones, thieves at the moment are producing fake receipts and invoices to idiot Apple into believing that they’re the precise house owners of the cellphone. While the tips embrace social engineering at Apple Stores, there are additionally “custom phishing kits for sale online designed to steal iCloud passwords from a phone’s original owner,” mentions Motherboard.

Additionally, a couple of hackers additionally reprogram stolen iPhones with a brand new IMEI. Besides this, there are additionally boards for the hacker group the place they share new strategies and tricks to break into locked iPhones.

Even some unnamed restore corporations have develop into precise prospects of corporations that illegally reset and reactivate the iCloud-locked iPhone.

“There are many listings on eBay, Craigslist, and wholesale sites for phones billed as ‘iCloud-locked,’ or ‘for parts’ or something similar,” added Motherboard. “While some of these phones are almost certainly stolen, many of them are not. According to three professionals in the independent repair and iPhone refurbishing businesses, used iPhones — including some iCloud-locked devices — are sold in bulk at private ‘carrier auctions’ where companies like T-Mobile, Verizon, Sprint, AT&T, and cell phone insurance providers sell their excess inventory (often through third-party processing companies.)”

Basically, within the occasion your iPhone is stolen or misplaced, make sure that you modify the password of your iCloud account instantly. Further, watch out for phishing scams and fastidiously examine the addresses or URLs of the web sites you go to, particularly login pages. It is really useful to maintain a novel password not solely to your iCloud account but in addition for each different on-line account. Also, guarantee that you’ve enabled two-step authentication in your iCloud account.


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.