
Audio By Carbonatix
A large number of people, mostly located in Australia, are reporting they have come under an unexplained attack that holds their iPhones and iPads hostage and demands they pay a $100 ransom.
The attack appears to work by compromising iCloud accounts associated with the disabled devices, according to an Apple support forum discussion that started Sunday morning and quickly accumulated several hundred posts.
Commandeered devices typically emit a loud tone that's associated with a feature that helps users locate lost or stolen devices. iPhones and iPads also display the message: "Device hacked by Oleg Pliss. For unlock device, you need send voucher code by 100 usd/eur (Moneypack/Ukash/PaySafeCard) to email:lock404@hotmail.com for unlock."
In some cases—specifically, when a user hasn't assigned a strong passcode to a locked device—it can only be unlocked by performing a factory reset, which completely wipes all previously stored data and apps.
The mass compromise is a variation on so-called ransomware scams, which initially targeted Windows PC users and earlier this month were found targeting smartphone users running Google's Android OS.
The forum accounts provide strong evidence that victims' Apple IDs and passwords have been compromised so that attackers can remotely lock connected devices using Apple's Find My iPhoneservice.
But so far it remains unclear exactly how the attackers are compromising the iCloud accounts.
While it's possible the hijackers used phishing attacks or hacked password databases to obtain the credentials, those explanations are undermined by the observation that the vast majority of victims were located in Australia and reported using a variety of e-mail providers. Typically, phishing campaigns and database compromises involving multiple providers affect users from more geographic regions.
DNS poisoning?
One participant in the online discussion theorized the mass compromise may have been the result of hacking domain name system (DNS) servers used by Australian service providers to translate human readable addresses such as Apple.com into the IP addresses Internet routers rely on.
Such an attack, which has yet to be confirmed in this case, works by"poisoning" the lookup tables of DNS servers so they secretly direct people to impostor sites. Assuming this technique was at play in the iPhone and iPad locking, affected users who entered a password on what appeared to be Apple's site could have unknowingly provided it to the people behind the attack.
Apple officials have yet to comment on the report. There is no indication the hijackings are the result of any compromise on Apple servers, so that leaves end users to figure out for themselves how to secure their own devices.
Readers are once again advised to use long, randomly generated passwords that are unique to their iCloud account. They should also enable two-factor authentication and assign a separate, randomly generated passcode to each iPhone and iPad they own.
Readers are reminded they can be permanently locked out of their Apple ID accounts, and possibly their iPhone or iPad when running iOS 7 with Find My iPhone turned on, if they are compromised before two-factor authentication is enabled. Two-factor authentication won't automatically prevent an attacker from compromising an iCloud account, but it will prevent the attacker from changing security questions and other crucial settings in the event of a breach.
The identities of the people behind the attack are unknown. There's no indication they have any connection to anyone named Oleg Pliss.
People with a locked device should immediately try changing the credentials for their Apple ID and ensure two-factor authentication is set up. In the event their locked device didn't have a passcode associated with it, they can perform a factory reset by using a cable to plug the device into their computer while iTunes is open.
More instructions are here.
Latest Stories
-
Kenpong intervenes as Afua Asantewaa, husband reconcile after public scrutiny
29 minutes -
“Pay this, pay that, and the patient dies” – Former UGMC boss demands end to cash-and-carry in emergency care
31 minutes -
Free Primary Healthcare: Gov’t floods clinics with 24,500 medical tools ahead of April 15 launch
1 hour -
Agyarko bolsters NPP chairmanship bid with Henry Quartey and Osei-Owusu as campaign leads
2 hours -
Sky-high spectacle as 2026 Kwahu Easter Paragliding Festival takes flight
2 hours -
Asiedu Nketia supports AshantiFest 2026 art initiative with GH¢50,000
2 hours -
Former UGMC boss recounts ‘up and down’ hospital nightmare resulting in niece’s death
3 hours -
Artemis II crew take ‘spectacular’ image of Earth
4 hours -
Afenyo-Markin criticises high costs stifling Ghanaian startups
4 hours -
Afenyo-Markin slams school feeding contractors for snubbing local rice farmers
4 hours -
This Saturday on Newsfile: Galamsey taxes, sole-sourcing probes, the Black Stars and presidential dialogue post-mortem
4 hours -
Guardiola wants Rodri to stay but says unhappy stars can go
5 hours -
[Playback] Gomoa Easter Carnival: Samini, Kofi Nti, and others deliver electrifying performances
6 hours -
US warns its citizens to leave Lebanon citing escalating security risks
7 hours -
Rapper Gucci Mane kidnapped and robbed by fellow artist, prosecutors say
8 hours
