Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Targeting iPhone Owners Who’ve Lost Their Devices

Posted on November 13, 2025November 13, 2025 By CWS

A brand new phishing marketing campaign is focusing on iPhone homeowners who’ve misplaced their units, exploiting their hope of restoration to steal Apple ID credentials.

The Nationwide Cyber Safety Centre (NCSC) has acquired a number of reviews of instances the place victims acquired textual content messages claiming their misplaced or stolen iPhones had been discovered overseas, generally months after the units went lacking.

These messages seem to return from Apple and embrace particular particulars concerning the gadget, reminiscent of mannequin, shade, and storage capability, making them look real and reliable.

The assault works by sending victims a textual content message or iMessage that claims their iPhone has been situated.

To make the rip-off extra convincing, attackers embrace correct details about the gadget that they’ll learn straight from the telephone itself.

The message comprises a hyperlink that supposedly reveals the gadget’s present location however truly redirects to a pretend web site designed to imitate Apple’s official login web page.

Rip-off SMS pretending to return from Apple and containing a hyperlink (Supply – NCSC)

When victims enter their Apple ID and password on this phishing web page, they unknowingly hand over full management of their account to the scammers.

NCSC safety analysts famous that these assaults have grow to be more and more frequent, with scammers refining their ways to make the messages extra plausible.

The phishing pages are rigorously designed to show what seems to be the gadget’s location within the background whereas requesting login credentials.

Phishing web page that asks for Apple ID entry information and reveals the alleged location of the misplaced iPhone within the background (Supply – NCSC)

This creates a way of urgency and legitimacy that may trick even cautious customers into getting into their data.

Understanding the Activation Lock Bypass

The first objective behind this phishing marketing campaign is to disable Apple’s Activation Lock, a safety characteristic that completely connects an iPhone to its proprietor’s Apple ID.

This lock makes stolen units utterly ineffective and unattainable to resell, as there isn’t a recognized technical methodology to bypass it.

Due to this robust safety, social engineering turns into the one real looking possibility for criminals to unlock and resell stolen iPhones.

The scammers face one main problem: discovering the telephone variety of a locked gadget. Whereas the precise strategies stay unclear, safety researchers consider attackers use two foremost approaches.

The primary entails accessing the SIM card that was within the telephone when it was stolen, supplied the proprietor has not blocked it but.

The second methodology exploits Apple’s Discover My characteristic, the place homeowners can show a message on the lock display screen with contact particulars like telephone numbers or e mail addresses for trustworthy finders to achieve them.

Sadly, this useful characteristic turns into a vulnerability when the gadget falls into felony fingers, offering them with the precise data wanted to launch focused phishing assaults.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Devices, iPhone, Lost, Owners, Phishing, Targeting, Whove

Post navigation

Previous Post: Firefox 145 and Chrome 142 Patch High-Severity Flaws in Latest Releases
Next Post: CISA Warns of Federal Agencies Not Fully Patching Actively Exploited Cisco ASA or Firepower Devices

Related Posts

Weekly Cybersecurity News Recap – Top Vulnerabilities, Threat and Data Breaches Cyber Security News
Threat Actors Attacking Cryptocurrency and Blockchain Developers with Weaponized npm and PyPI Packages Cyber Security News
Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure Cyber Security News
CISA Adds MDaemon Email Server XSS Vulnerability to KEV Catalog Following Exploitation Cyber Security News
New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access Cyber Security News
Chinese Hackers Exploit Microsoft Exchange Servers to Steal COVID-19 Research Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it
  • Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts
  • FortiWeb Authentication Bypass Vulnerability Exploited
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it
  • Critical Fortinet FortiWeb Vulnerability Exploited in the Wild to Create Admin Accounts
  • FortiWeb Authentication Bypass Vulnerability Exploited
  • Russian Hackers Create 4,300 Fake Travel Sites to Steal Hotel Guests’ Payment Data
  • Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News