Technologist Mag
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

What's On
These Instagram Ads Sure Seem to Be Selling Cocaine Accessories

These Instagram Ads Sure Seem to Be Selling Cocaine Accessories

14 May 2026
Windows 11 will clean up its own driver mess so you don’t have to

Windows 11 will clean up its own driver mess so you don’t have to

14 May 2026
Best Buy May Have Leaked Grand Theft Auto VI Preorders Going Live Monday

Best Buy May Have Leaked Grand Theft Auto VI Preorders Going Live Monday

14 May 2026
Your iPhone Gets Stolen. Then the Hacking Begins

Your iPhone Gets Stolen. Then the Hacking Begins

14 May 2026
Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

14 May 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Technologist Mag
SUBSCRIBE
  • Home
  • Tech News
  • AI
  • Apps
  • Gadgets
  • Gaming
  • Guides
  • Laptops
  • Mobiles
  • Wearables
  • More
    • Web Stories
    • Trending
    • Press Release
Technologist Mag
Home » Your iPhone Gets Stolen. Then the Hacking Begins
Tech News

Your iPhone Gets Stolen. Then the Hacking Begins

By technologistmag.com14 May 20264 Mins Read
Your iPhone Gets Stolen. Then the Hacking Begins
Share
Facebook Twitter Reddit Telegram Pinterest Email

Every year, millions of phones are stolen. While thousands of iPhones are shipped to China and broken down for parts, criminals can make more money selling a device that has been unlocked and wiped. Now researchers have unpicked part of the underground web of cybercrime services that can help provide access to stolen iPhones.

Across the web and on Telegram, there’s a “thriving” ecosystem of software sellers helping power the market for stolen iPhones by providing “unlocking” tools and the technology to produce phishing messages to help get access to a phone, according to findings from researchers at cybersecurity firm Infoblox. The company says it has tracked “dozens” of groups selling unlocking tools, mostly with a focus on iPhones, and has linked more than 10,000 phishing websites to the activity. Traffic to these domains increased 350 percent last year, the researchers say.

“Reselling is a hundred percent what they’re going for,” says Maël Le Touz, a staff threat researcher at Infoblox, who says people from all around the world appear to be buying access to the pay-per-use software. The average cost is below $10. “Most of the people looking to unlock phones clearly don’t have thousands of phones in their hands—they’re not at that scale,” Le Touz says.

Over the last few years, the number of phones being stolen has risen—for example, with around 80,000 devices being taken in London in one year. While Apple and Google have improved their protections for stolen devices, a variety of more- and less-sophisticated thieves can still make money from stolen handsets: If a phone is unlocked or a thief has its passcode, they can potentially steal money from online bank accounts or crypto wallets; those snatching phones on the streets or in bars can make hundreds of dollars selling them on.

“Phone thieves don’t just want the handset—they want access to bank accounts and personal information,” says Will Lyne, the head of economic and cybercrime at London’s Metropolitan Police. Lyne highlights one case of four men who had been caught handling more than 5,000 stolen phones and spending money from financial accounts on the devices.

Dan Guido, the CEO and cofounder of security firm Trail of Bits and a strategic adviser to mobile security firm iVerify, says a stolen phone may only be worth $50 to $200 when it is locked. “But if you unlock it, it’s worth $500, or it’s worth $1,000.” That difference can encourage people to develop ways to try and get into devices. “This whole thing is an ecosystem, and there’s multiple people at different levels of the supply chain that all work together in order to unlock phones,” he says.

Security researchers at Infoblox started looking into the stolen-phone unlocking economy earlier this year when a law-enforcement-related contact in Asia messaged them saying their iPhone had been stolen and they had received a phishing message after including alternative contact details on the locked device. A link in the phishing page mimicked an Apple Find My page and showed a false map with the phone’s location—it then showed a pop-up asking for the phone’s PIN code.

Numerous people online, as well as the Swiss National Cybersecurity Center, have reported receiving phishing messages after losing or having their iPhones stolen, with the attackers aiming to get access to Apple iCloud accounts and remove them from phones. “To make the messages look convincing, they include accurate details of the missing device—such as its model, colour, and storage capacity—which the scammers can read directly from the phone itself,” the Swiss body wrote in November. “As there is no known way to bypass this lock, tricking the owner through social engineering is the only realistic option for criminals.”

Share. Facebook Twitter Pinterest LinkedIn Telegram Reddit Email
Previous ArticleFelt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon
Next Article Best Buy May Have Leaked Grand Theft Auto VI Preorders Going Live Monday

Related Articles

These Instagram Ads Sure Seem to Be Selling Cocaine Accessories

These Instagram Ads Sure Seem to Be Selling Cocaine Accessories

14 May 2026
Windows 11 will clean up its own driver mess so you don’t have to

Windows 11 will clean up its own driver mess so you don’t have to

14 May 2026
Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

14 May 2026
Review: Klipsch the Fives II

Review: Klipsch the Fives II

14 May 2026
Meta is testing an AI bot to unleash the same online stupidity that is AskGrok on X

Meta is testing an AI bot to unleash the same online stupidity that is AskGrok on X

14 May 2026
AI Promised the Audemars Piguet x Swatch Wristwatch. China Will Deliver It

AI Promised the Audemars Piguet x Swatch Wristwatch. China Will Deliver It

14 May 2026
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest tech news and updates directly to your inbox.

Don't Miss
Windows 11 will clean up its own driver mess so you don’t have to

Windows 11 will clean up its own driver mess so you don’t have to

By technologistmag.com14 May 2026

It seems that Microsoft is keeping up its promise of making Windows 11 better. After…

Best Buy May Have Leaked Grand Theft Auto VI Preorders Going Live Monday

Best Buy May Have Leaked Grand Theft Auto VI Preorders Going Live Monday

14 May 2026
Your iPhone Gets Stolen. Then the Hacking Begins

Your iPhone Gets Stolen. Then the Hacking Begins

14 May 2026
Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

Felt the wrath of network dead zones? AT&T, T-Mobile, and Verizon are coming together to save you, soon

14 May 2026
Kylie Jenner Calls The Legend Of Zelda: Breath Of The Wild ‘One Of The Best Games Ever’

Kylie Jenner Calls The Legend Of Zelda: Breath Of The Wild ‘One Of The Best Games Ever’

14 May 2026
Technologist Mag
Facebook X (Twitter) Instagram Pinterest
  • Privacy
  • Terms
  • Advertise
  • Contact
© 2026 Technologist Mag. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.