Phishing cracked iPhones: what is it and how to avoid it?
In our articles, you have repeatedly read that Apple technology is a wide and comprehensive market, including for intruders. Our previous article concerns that fraudsters can sell you an iPhone with defects or a fake gadget. But what if you bought even a new and certified iPhone, but you can’t protect your data and your gadget as a whole from intruders?
What is phishing?
There are many ways to get access to the gadget, but most of them are based on phishing technology. In general terms, this is a fraudulent scheme of replacing the entrance to the official resource or changing the entrance to your personal account. Fraudsters create a resource as similar as possible to the official, say, Apple. An email is sent to your email address that you allegedly need to confirm your personal data, and this can be done via the link. The link enclosed in the message, of course, leads not to the official page, but to its copy. You send the data by yourself and, as a rule, you don’t even know that you have been deceived. Until your Apple ID or other important account is blocked.
Stolen Apple gadgets and data from them are dark and profitable business all over the world. During 2016, 23,000 iPhone gadgets were stolen from Miami Airport. All of them fall on the black market, and deceived owners are left with nothing.
What are the most common types of phishing on Apple gadgets?
Most often, the data that the fraudsters are going to lure away from you is the entrance to your Apple ID. This is important and expensive data with which you can manage Apple gadgets. Such data can be expensive to sell on the black market or to pull money from the affected owner. When fraudsters receive login information, they change their email and password to login. Next, the victim is faced with a situation where he can not log into the account. After some attempts to enter the record, the person starts to panic and becomes a victim of fraudsters. It was at that time that he was offered to buy data and regain control of the Apple ID. To cheat device, scammers use applications and options like MagicApp, Applekit and Find My iPhone.
An important aspect is hacking email, linked to many of your accounts. The scheme is the same: you receive an email with a request to confirm your login information. You follow the external link and do not notice that the site is copied from the official resource. If the mail is primary, it usually has links to social network accounts and other useful information. Even in the letters of the mail itself, you can store a database of customers, data of other persons, important correspondence and the like. Hacking such mail will also be a valuable redemption product, and fraudsters can take advantage of this. According to the same scheme, you will be offered a ransom control to the mail.
What to do if you are a victim of phishing?
As a rule, deceived owners of important data begin to panic and agree to all the conditions of the attackers. This should not be done, it is better to turn to law enforcement. Also, you can try to recover the entrance to the Apple ID through the official resource of Apple. Their experts are constantly faced with the fact that users are victims of phishing. If your device is original and if you have a box from it, according to the available data, you can restore access by writing or calling Apple technical support specialists.
If people are calling you who have introduced themselves as specialists with Apple, check this data. Ask for confirmation, indicate that your conversation is being recorded. Pay attention to the literacy and pronunciation of the company representative.
We do not recommend transferring money to intruders. This will not save you from further possible attacks on your accounts. Also the amount of the ransom may be prohibitively large. In general, the purchase of accounts only stimulates this black business, so you will increase the amount of crime by actually financing it. Contact the cyber police, law enforcement agencies – experts will tell you what to do in this situation.
How to check when buying a used iPhone, that it is not stolen?
Pay attention to the equipment, the seller and the unique phone codes. Our previous article is about the nuances of buying a used iPhone, but if you are only interested in whether the phone has been stolen, pay attention to IMEI. You can view IMEI in the settings or on the back panel of the smartphone. Enter this number on the official Apple resource and get information about it – was it blocked, stolen or lost. In case the phone is stolen or blocked in another way, you cannot use it fully in the future.
How to avoid loss of access to data through phishing?
The most basic rule to protect against theft of data by phishing: do not follow external unsafe links. Well check the addressee of the letter, as well as links which you follow. Often, attackers order domains for their pseudo-resources that most closely resemble the original ones. So pay attention to such things. If in doubt, open the official resource in a new tab and see if there is a request for data entry, as written in your letter.
Second, use security systems like Touch ID or Face ID and passcode. If you can change the authentication to the social networks you use to two-factor, do it. Sometimes you will spend more time on access and all confirmations, however, this will protect your personal data from unauthorized people. In case your business is associated with correspondence by mail or in instant messengers, you will give attackers confidential data not only your own, but also to your interlocutors.
We also recommend that you enable automatic blocking in Find My iPhone. And, of course, from time to time you should transfer data from the phone to a computer or other reliable source of information storage.
Remember that phishing attacks are massive. Fraudsters rely only on a small percentage of people who click on the link, lose access to the data and pay the ransom. Therefore, warn about the danger of hacking gadgets of your relatives and friends. And do not forget that any user can become a victim of intruders.
So, on the substitution of the official resources with the pseudo-resources, fraudsters earn big money. The black market, where they sell gadgets and data from them, is billions of dollars in turnover. Any user can become a victim of deceivers, therefore, it is the duty of every person using a gadget, payment systems, social networks and the like to protect data. Remember that in the case of the exposure of your data, you endanger the data of your interlocutors, customer base, information that does not relate directly to you. Therefore, take care of data protection in advance, because you are responsible for all the information contained on your devices.