IPhone Hijacking And Demanding Money In Australia

Published By:

This week, In Australia people are receiving anonymous messages from hacker that the iPhone is hacked and locked, unless they send some ransom to their PayPal accounts.

These practices are now seemed confined to Australia, but in US  iPhone users are also reporting in Apple’s discussion forum, alerting to new trouble.

iphone-hijecking

Those users who had pass codes on their iPhone devices are likely to be able to get backed in, but those who did not have, they had to restore their iPhone by factory setting, and they will have backed up if they are tuned to iTunes when doing so.

According to the Internet security firm Norton, about five years ago hacking came out from Russia and Eastern Europe and spread to the west. It has become more predominant since two years with criminals typically when charging between $60 and $200 to unlock a computer. According to Norton there are various malwares; victims are paying about $5 million per year.

Locking and money demanding strategy has been used on laptops and desktop devices and it is spreading gradually to mobile. Some blogs are reporting that Yahoo and eBay security leaks may link to these kinds of attacks.

It is likely that hackers gained access to the leaked email and password information and people are using these emails to their Apple ID. This may link to database breaches and targeting those subscribers. Mobile technology is much related to our lives and many of us are using our smartphone so close to ourselves and this could be more critical for us.

It is suggested that, due to these security flaws that hacker may be able to unlock some BMWs remotely; i Remote app is used in certain BMW models by which heat or Ac can be turned on and doors can be unlocked outside by drivers. Blackshades or RAT tool is used by hacker for extortion, collecting keystrokes to steal passwords and using people’s computer webcams and bank fraud.

In order to prevent attacks you should enable a pass code on your smartphone. Also, you should start using two-step verification if you haven’t used before, and you must have set a different password for each of your accounts.

Leave a Reply

Your email address will not be published. Required fields are marked *