Attackers, armed with stolen iCloud passwords, are turning Apple’s “Find My iPhone” feature into a way to collect ransom.
It’s a new, chiefly Russian scam affecting iPhones and iPads. An attacker uses iCloud’s “find device” feature to lock an Apple device remotely, then demands money before he unlocks the device, usually $30 to $50.
But where are the attackers getting the iCloud passwords from?
CSO reports that certain security professionals have been discussing “rumblings of a massive data breach at Apple.”
Apple says there is no truth to the rumour and that there has not been a data breach.
Instead, it’s likely the attackers are getting passwords through more traditional methods, such as guessing or using account information from leaked databases like LinkedIn.
Here’s how the Russian device locking scam works, according to software tester Dmitrii Kilishek, who got hit by it in May.
One day, his phone locked itself, and put itself in “lost mode,” which is usually used by an iPhone’s owner to secure a device that’s been stolen or lost.
Instead, an attacker activated lost mode, and used Apple’s lost iPhone message function to display a message in Russian that translates roughly to “to get your password send an email to [email protected]”
When Kilishek emailed the address, they asked him for 1500 rubles, or about $23, or else they would use Apple’s built-in functions to wipe his phone.
In order for the attacker to activate lost mode, he needed Kilishek’s iCloud username and password.
These scams are possible because people reuse passwords across sites, and since several Russian social networks and LinkedIn have been hacked, passwords are floating around.
Reused passwords are probably how a separate hacking group has been able to send messages from the social accounts of major tech executives, such the CEOs of Google and Facebook.