The hackers behind those iPhone ransom attacks have been arrested in Russia
A man and a teenaged boy are accused of using phishing and social engineering attacks to hijack Apple IDs and lock iOS devices
IDG News Service - Russian authorities arrested a man and a teenaged boy from Moscow under suspicion that they compromised Apple ID accounts and used Apple's Find My iPhone service to hold iOS devices for ransom.
Find My Phone is an Apple iCloud feature that allows iPhone, iPad and Mac owners to remotely lock and track their devices if they're lost or stolen. A custom message can be displayed on the lockscreen when the feature is activated. In late May, many users from Australia and other countries reported that their iPhones were locked with a message claiming the device was hacked by a person or group named Oleg Pliss who demanded US$100 or euros to unlock it.
Apple said at the time that the incidents were not the result of iCloud being compromised and hinted that password reuse across multiple online accounts might be the cause of the hijackings.
It's not clear if the two Moscow residents, aged 16 and 23, were behind the Oleg Pliss attacks, but a press release Monday from the Russian Ministry of Interior that announced the arrests described a similar modus operandi.
The two allegedly compromised email accounts and used phishing pages and social engineering techniques to gain access to Apple ID accounts. They are then accused of using the Find My Phone feature to lock the associated devices and send messages to the owners threatening to delete data unless the ransom was paid.
Another technique involved placing advertisements online that offered to rent an Apple ID account with access to a lot of media content. Once users accepted the offer and linked their devices with that account, the attackers then used the Find My Phone feature to hijack them, Russian authorities said.
The Russian Ministry of Interior said it started receiving reports about such attacks in the spring. Regaining control of locked devices proved difficult for victims because they had to present Apple with an identity document and a receipt from the store where they purchased their device, the ministry said.
The apartments of the two suspects were searched and authorities seized computer equipment, SIM cards and phones that were supposedly used for illegal activities.
The two face charges of unauthorized access to computer information under the Russian Criminal Code.
- Apple will 'set the world on fire' with iPhone 6 sales
- The other Apple economy: $2B in devices on eBay
- Apple sends users scrambling for OS X Yosemite
- Apple grows Mac sales by 18% on the back of the MacBook Air
- What to listen for during Apple's earnings call today
- Timeline: How Apple's iOS gained enterprise cred
- Apple and IBM: A winning combo for IT
- IBM and Apple ties go way back
- Apple quickly counters China claim of iPhone spying
- China calls the iPhone and iOS 7 threats to national security
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts