Connect with us
Thieves have learned to bypass the function quotFind iPhonequot on Thieves have learned to bypass the function quotFind iPhonequot on

Security

Thieves have learned to bypass the function "Find iPhone" on stolen phones

Published

on

When Find My iPhone is disabled, iPhone can be rolled back to factory settings and registered with another Apple ID.

While iPhone theft is commonplace, the Find My feature allows true owners to disable thieves from accessing their phone and prevent factory reset. However, it turns out to be quite easy to get around this feature.

The India Today edition told the story of a user under the pseudonym Vedant, who was hopelessly deprived of his iPhone 12.

The user lost their phone and started taking all the necessary measures, including trying to use the Find iPhone function to find out where the device is. However, it turned out that the iPhone was offline, and the system could not determine its exact location. Vedant activated Lost Mode, filed a police report and blocked the SIM card. When Lost Mode is on, iPhone is locked so that no one can access the information stored on it after it is turned on.

Several days passed and Vedant began to lose hope. Then he received an SMS message, which said that the iPhone was found, and if you click on the specified link, you can find out his location. The link was not suspicious because it contained the words “icloud” and “findmy”, but in fact it was created by the phone thieves.

After clicking on the link, an authorization window appeared on the screen, and the unsuspecting Vedant entered his password and Apple ID, which immediately went to the thieves.

A minute after the alleged authorization, the user received an email notification that access to his Apple ID was obtained on a computer running Windows. Vedant tried to change the password and remove the Windows PC from its Apple ID, but it was too late. The kidnappers have already removed the iPhone from Apple ID and disabled Find My iPhone.

The attackers obtained Vedant’s phone number by inserting its SIM card into a new device and calling themselves. However, it is not entirely clear why the number from which the link was sent was the same from which Microsoft sends verification codes for two-factor authentication. Most likely, spoofing took place here, which indicates a high professional level of the thieves.

When Find My iPhone is disabled, iPhone can be rolled back to factory settings and registered with another user’s Apple ID as if it had been legally acquired.

Click to comment

Leave a Reply

Your email address will not be published.

Security

Cryptocurrency exchange Binance was robbed of $570 million. Hacker withdrew BNB tokens

Published

on

Cryptocurrency exchange Binance was robbed of 570 million Hacker withdrew

Cryptocurrency exchange Binance has undergone another hacker attack. The attackers managed to withdraw BNB tokens worth about $570 million.

Cryptocurrency exchange Binance was robbed of $570 million.  Hacker withdrew BNB tokens

Somewhat earlier it was reported that the attack allowed the hackers to steal about $110 million, but now it turned out that everything is much worse. At the same time, the specialists of the exchange managed to freeze part of the funds, but we are talking about only 7 million dollars, which is clearly insignificant against the background of 570 million.

The exchange revealed that a cross-chain bridge connected to its BNB chain was attacked, allowing hackers to move BNB tokens off the network. Now the network has been restored, and the clients’ funds, according to Binance, are safe.

The fact of the theft of funds contributed to a sharp drop in the BNB rate by almost 5%, but after a few hours, almost half of the fall was redeemed.

Continue Reading

Security

Hacker who earned $27 million in cyberattacks will spend 20 years in prison and pay $21 million in fines

Published

on

Hacker who earned 27 million in cyberattacks will spend 20

A Florida district court has sentenced 34-year-old IT engineer Sebastien Vashon-Desjardins to 20 years in prison for carrying out at least 90 cyberattacks.

Hacker who earned $27 million in cyberattacks will spend 20 years in prison and pay $21 million in fines

It is noted that for several years of his activity, the hacker, using the NetWalker encryption virus, earned about $ 27 million. A search of Vashon-Desjardins revealed a crypto wallet containing 719 bitcoins, which was about $22 million at the time of the cybercriminal’s arrest in January 2022.

According to investigators, the 34-year-old cybercriminal acted in collusion with other hackers. Vashon-Desjardins himself played the role of an attacker: he infected the corporate networks of various companies with a virus and then demanded a ransom from them. Organizations from the USA, Canada and a number of European countries suffered from the activities of the criminal.

It is noted that, in addition to the prison term, the court also imposed a fine on Vashon-Desjardins in the amount of $ 21 million. Also, the criminal will have to pay compensation to the companies affected by his actions. The amount of damages has not yet been established.

Continue Reading

Components

Unique behavior of Ryzen 7000 processors. The notorious patches from the Specter vulnerability improve the performance of new CPUs

Published

on

Unique behavior of Ryzen 7000 processors The notorious patches from

Recently, various vulnerabilities in processors have been talked about much less often, and users no longer worry about performance degradation due to patches. As it turns out, Ryzen 7000 processors generally benefit from such patches!

Unique behavior of Ryzen 7000 processors. The notorious patches from the Specter vulnerability improve the performance of new CPUs

At least this is true for Linux, since it was in this OS that the author tested the Ryzen 9 7950X and Ryzen 5 7600X. It turned out that when working out of the box, the CPUs show better performance than when loading a special version of Linux with a deactivated patch from the Specter V2 vulnerability.

Unique behavior of Ryzen 7000 processors. The notorious patches from the Specter vulnerability improve the performance of new CPUs

Of course, such results do not appear everywhere, and during normal work they are unlikely to be critical. In particular, in total, according to the results of 190 tests, the difference was only 3%.

Continue Reading

Most Popular