Thieves Behind Stolen iPhones Employ Advanced Unlocking Techniques

0

In a chilling revelation, it has been uncovered that a syndicate of cybercriminals in Zambia possesses sophisticated techniques to bypass security measures on stolen iPhones. This group, responsible for the theft of over 10,000 devices, is exploiting even Apple’s highly regarded “Lost Mode” feature to commit identity theft and financial fraud.

Exploiting “Lost Mode” for Malicious Gains

When iPhone users activate “Lost Mode” to secure their devices, the feature displays the owner’s mobile number on the lock screen. What seems like a safeguard has become an advantage for tech-savvy thieves, who use the displayed number to impersonate victims and gain access to sensitive accounts stored on the device.

This startling revelation came from six suspects apprehended by the Zambia Information and Communications Technology Authority (ZICTA) Cybersecurity Task Force. The suspects, identified as Leonard Kasonde, John Phiri, Lewis Daka, Ephraim Bwalya, Stanley Banda, and Mike Mwanza, were arrested in Kabanana while driving an unregistered silver Lexus.

International Network of Criminals

Authorities disclosed that the suspects are linked to a criminal network trafficking stolen devices to neighboring countries, including Zimbabwe. Investigations were sparked by the theft of an iPhone 14 Pro Max, which led to unauthorized access to a victim’s bank account and social media profiles.

A subsequent raid recovered three iPhone 14 Pro Max devices, four Tecno Fortune phones, 30 Airtel SIM cards, and 25 MTN SIM cards. Further analysis revealed a connection to a K900,000 fraud case in Choma, cementing their ties to a larger electronic theft and financial fraud operation.

Advanced Unlocking Techniques

Perhaps the most alarming discovery is the group’s ability to bypass advanced security measures, including fingerprint and facial recognition technology. These techniques enable them to render devices untraceable even through IMEI tracking.

Tips to Protect Yourself

Authorities have issued the following recommendations to reduce vulnerability:

  1. Report Stolen Devices Immediately: Use ZICTA’s *707# service to report stolen phones and SIM cards promptly.
  2. Avoid Activating “Lost Mode”: Use this feature cautiously, as it can unintentionally provide criminals with vital information.
  3. Switch to eSIM Technology: eSIMs are harder to duplicate and offer enhanced security against SIM card theft.
  4. Educate Contacts: Inform friends and family about scams linked to stolen phones to prevent identity theft.

Ongoing Investigations

The ZICTA Cybersecurity Task Force continues its efforts to uncover the full extent of this network’s operations and identify additional suspects. With their advanced techniques and international reach, this syndicate poses a significant threat to digital security across the region.

As the investigation unfolds, authorities urge the public to remain vigilant and take preventive measures to secure their devices and personal information.