The Wall Street Journal has recently published a detailed article covering a technique that thieves are using to steal not only people’s iPhones, but also their savings. The success of the attack is dependent on the thieves (often working in groups) learning not only physical access to the device but also the passcode — the short string of numbers that acts as a failsafe when TouchID or Face ID fails (or isn’t used, for whatever reason). With the passcode and the device, thieves are able to change the password associated with an Apple ID “within seconds”, while also remotely logging out of any other connected Macs or iPads.
After that, the phone can be freely used to empty bank accounts using any installed financial apps before being sold. The article contains numerous examples of victims who have lost tens of thousands of dollars as a result of the scam.
How the iPhone passcode scam works?
According to the Journal, incidents have occurred in New York, Austin, Denver, Boston, Minneapolis, and London. The attack usually occurs on nights out when people’s guards have been lowered by alcohol. Thieves typically observe people entering their passcodes (sometimes filming to ensure accuracy) and then steal the phone when the victim’s guard is down.
“It’s just as simple as watching this person repeatedly punch their passcode into the phone,” Serge
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents
Read the original article: