Attackers, armed with stolen iCloud passwords, are turning Apple’s “Find My iPhone” feature into a way to collect ransom.
It’s a new, chiefly Russian scam affecting iPhones and iPads. An attacker uses iCloud’s “find device” feature to lock an Apple device remotely, then demands money, usually $30 to $50, before they unlock the device.
But where are the attackers getting the iCloud passwords from?
CSO reports that certain security professionals have been discussing “rumblings of a massive (40 million) data breach at Apple.”
Apple says there is no truth to the rumor and that there has not been a data breach.
Instead, it’s likely the attackers are getting passwords through more traditional methods, such as phishing or using account information from leaked databases like LinkedIn.
Here’s how the Russian device-locking scam works, according to software tester Dmitrii Kilishek, who got hit by it in May.
One day, his phone locked itself and put itself in “lost mode,” which is usually used by an iPhone’s owner to secure a device that’s been stolen or lost.
Instead, an attacker activated lost mode and used Apple’s lost-iPhone message function to display a message in Russian that translates roughly to: “to get your password send an e-mail to email@example.com.”
When Kilishek emailed the address, he said they asked him for 1500 rubles, or about $23, or else they would use Apple’s built-in functions to wipe his phone.
This kind of attack first surfaced in 2014.
In order for the attacker to activate lost mode, he needed Kilishek’s iCloud username and password.
These scams are possible because people reuse passwords across sites, and since several Russian social networks and LinkedIn have been hacked, lists of passwords are floating around.
Reused passwords are probably how a separate hacking group has been able to send messages from the social accounts of major tech executives, such the CEOs of Google and Facebook.