Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Targeting iPhone Owners Who’ve Lost Their Devices

Posted on November 13, 2025November 13, 2025 By CWS

A brand new phishing marketing campaign is focusing on iPhone homeowners who’ve misplaced their units, exploiting their hope of restoration to steal Apple ID credentials.

The Nationwide Cyber Safety Centre (NCSC) has acquired a number of reviews of instances the place victims acquired textual content messages claiming their misplaced or stolen iPhones had been discovered overseas, generally months after the units went lacking.

These messages seem to return from Apple and embrace particular particulars concerning the gadget, reminiscent of mannequin, shade, and storage capability, making them look real and reliable.

The assault works by sending victims a textual content message or iMessage that claims their iPhone has been situated.

To make the rip-off extra convincing, attackers embrace correct details about the gadget that they’ll learn straight from the telephone itself.

The message comprises a hyperlink that supposedly reveals the gadget’s present location however truly redirects to a pretend web site designed to imitate Apple’s official login web page.

Rip-off SMS pretending to return from Apple and containing a hyperlink (Supply – NCSC)

When victims enter their Apple ID and password on this phishing web page, they unknowingly hand over full management of their account to the scammers.

NCSC safety analysts famous that these assaults have grow to be more and more frequent, with scammers refining their ways to make the messages extra plausible.

The phishing pages are rigorously designed to show what seems to be the gadget’s location within the background whereas requesting login credentials.

Phishing web page that asks for Apple ID entry information and reveals the alleged location of the misplaced iPhone within the background (Supply – NCSC)

This creates a way of urgency and legitimacy that may trick even cautious customers into getting into their data.

Understanding the Activation Lock Bypass

The first objective behind this phishing marketing campaign is to disable Apple’s Activation Lock, a safety characteristic that completely connects an iPhone to its proprietor’s Apple ID.

This lock makes stolen units utterly ineffective and unattainable to resell, as there isn’t a recognized technical methodology to bypass it.

Due to this robust safety, social engineering turns into the one real looking possibility for criminals to unlock and resell stolen iPhones.

The scammers face one main problem: discovering the telephone variety of a locked gadget. Whereas the precise strategies stay unclear, safety researchers consider attackers use two foremost approaches.

The primary entails accessing the SIM card that was within the telephone when it was stolen, supplied the proprietor has not blocked it but.

The second methodology exploits Apple’s Discover My characteristic, the place homeowners can show a message on the lock display screen with contact particulars like telephone numbers or e mail addresses for trustworthy finders to achieve them.

Sadly, this useful characteristic turns into a vulnerability when the gadget falls into felony fingers, offering them with the precise data wanted to launch focused phishing assaults.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Devices, iPhone, Lost, Owners, Phishing, Targeting, Whove

Post navigation

Previous Post: Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases
Next Post: CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices

Related Posts

Top 3 Evasion Techniques In Phishing Attacks: Real Examples Inside  Cyber Security News
Hackers Exploit RTL/LTR Scripts and Browser Gaps to Hide Malicious URLs Cyber Security News
CISA Warns of Fortinet FortiWeb WAF Vulnerability Exploited in the Wild to Gain Admin Access Cyber Security News
New GitHub Device Code Phishing Attacks Targeting Developers to Steal Tokens Cyber Security News
Hackers Weaponizing Calendar Files as a New Attack Vector Bypassing Traditional Email Defenses Cyber Security News
GLOBAL GROUP’s Golang Ransomware Attacks Windows, Linux, and macOS Environments Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach
  • MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
  • Fortinet Warns of New Attacks Exploiting Old Vulnerability
  • Coupang to Issue $1.17 Billion in Vouchers Over Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top US Accounting Firm Sax Discloses 2024 Data Breach Impacting 220,000
  • Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach
  • MongoDB Attacks, Wallet Breaches, Android Spyware, Insider Crime & More
  • Fortinet Warns of New Attacks Exploiting Old Vulnerability
  • Coupang to Issue $1.17 Billion in Vouchers Over Data Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark