ECONOMY & WORK
MONEY 101
NEWS
PERSONAL FINANCE
NET WORTH
About Us Contact Us Privacy Policy Terms of Use DMCA Opt-out of personalized ads
© Copyright 2023 Market Realist. Market Realist is a registered trademark. All Rights Reserved. People may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.
MARKETREALIST.COM / NEWS

Scammers Made $400K in 2 Years Exploiting Apple’s ‘Someone Else Picks It Up’ Feature

Since 2021, Apple has been sending out identical alerts to people in over 150 countries, indicating that the threat is real and persistent.
PUBLISHED APR 22, 2024
Cover Image Source: The Apple company logo hangs above an Apple retail store| Photo by Scott Olson | Getty Images
Cover Image Source: The Apple company logo hangs above an Apple retail store| Photo by Scott Olson | Getty Images

Experts at a cybersecurity conference raised concerns about a feature on the Apple Store Online called 'Someone else picks it up.' Scammers exploited this feature and made off with more than $400,000 in just two years.

Image Source: Apple phones on display in an Apple store | Photo by Joe Raedle | Getty Images
Apple phones on display in an Apple store | Photo by Joe Raedle | Getty Images

In September 2022, researchers Gyuyeon Kim and Hyunho Cho of the Financial Security Institute of South Korea learned about many significant cyberattacks on more than fifty popular online retailers. Numerous instances of compromised sensitive information were made evident by these attacks. Without being discovered, the fraudsters were able to manipulate these online retailers' payment sites. Together with genuine transactions, they diverted credit card numbers and personal information to their servers.

If you allow someone else—a friend or family member—to pick up your online order at an Apple Store and present them with proof of purchase, you have the choice to do so. Therefore, scammers obtained credit card information that had been stolen. Using these cards, they would make online purchases of Apple devices, designating certain individuals from thrift stores as authorized pick-up recipients. As an illustration, suppose they used the stolen card to pay only $800 for the $1,000 iPhone. Following the pickup of the iPhone by the employee of the thrift store, the con artists would keep the $800 that the victim had paid.

Image Source: Attendees look at brand new Apple products during an Apple event | Photo by Justin Sullivan/Getty Images
Image Source: Attendees look at brand new Apple products during an Apple event | Photo by Justin Sullivan/Getty Images

The research group called the Apple store scam "Poisoned Apple." Based on hints such as purchasing a domain name from a Chinese ISP, they believe the offenders are Chinese. On the dark web, they came across material written in simplified Chinese that was linked to an email address that had been inadvertently left in the source code. The entire operation was discovered by the researchers when they came across a web server running software that the thieves were using to gather stolen data. The offenders' IP address was revealed by configuration errors even though they were hiding behind several layers of IP addresses utilizing Cloudflare's content delivery networks.

Apple has alerted iPhone customers in 92 countries to possible harmful threats. The potential of mercenary malware attacks was brought to light by this advisory, which was issued in early April. The business underlined how severe the situation is and said that these attacks probably target particular people because of who they are or what they do. Apple has been alerting customers about this vulnerability for a long time; since 2021, they have been sending out identical alerts to people in over 150 countries. This indicates that the threat is real and persistent.

Image Source: Customers try out the new iPhone 15 at an Apple store| Photo by Lintao Zhang | Getty Images
Customers try out the new iPhone 15 at an Apple store| Photo by Lintao Zhang | Getty Images

These are extremely sophisticated attacks, especially the ones that use the NSO Group's Pegasus spyware. An Israeli business called NSO specializes in remote iPhone hacking. A US judge decided in Meta's favor in March 2024, ordering NSO to turn over its Pegasus code. Pegasus malware can take over a mobile device and use it to send and receive messages, make calls, and steal personal data. These attacks frequently linked to governmental or corporate groups call for substantial resources and specially designed strategies for certain targets.

MORE ON MARKET REALIST
While he has a spotless track record on screen, Jennings loves to have fun behind the scenes.
9 hours ago
The contestant, Desiree Kramer pulled off a stunning sub-two second win in the finale.
10 hours ago
The painting from former NFL Player Ernie Barnes turned out to be one of the most valuable pieces.
11 hours ago
Contestant Eleni Kapetanakis faced a rather unusual 'Place' category puzzle on the show.
12 hours ago
The seller brought the original tie and handkerchiefs worn by James Gandolfini on 'The Sopranos.'
1 day ago
Fans said they weren't 'having a few laughs' after Kiana Moreland missed the $100,000 jackpot.
1 day ago
'I had no idea it existed,' one viewer said after contestant Auriel Heath failed to guess the rare dish.
1 day ago
Though Banana Phone didn’t land a deal on the show, it gained massive traction afterward.
2 days ago
Ken Jennings recently won $1 million on 'Who Wants to Be a Millionaire,' and says he could do it again.
2 days ago
Genius Litter founder Ramon Van Meer impressed the panel and ended up triggering a Shark fight.
3 days ago
Contestants Danielle Williams and Adam Bencan took the loss in stride, but viewers were enraged.
3 days ago
Ken Jennings explained what he does differently compared to the show's former legendary host, Alex Trebek.
3 days ago
Contestant Elizabeth Caprini could've won a brand new Mercedes-Benz, but was stumped by a simple puzzle.
4 days ago
The father-son duo of Miles and Maurice Huffman shared their struggles ahead of negotiations.
4 days ago
While the item was potentially worth $20,000, Harrison admitted he couldn't sell it.
4 days ago
The co-founders of Nutr blew the only chance they had to convince Daniel Lubetzky.
4 days ago
The player, Brandon Rothstein had cracked the puzzle even before the timer kicked off.
5 days ago
Stars from the Real Housewives Franchise, Kandi Burrus-Tucker and Kyle Richards, cracked the host up
5 days ago
Emmitt Smith was happy to authenticate his signature on a photo from his first NFC Championship game.
5 days ago
Melissa Brickey seemed to be caught up in a loop of losing her winnings — until she finally escaped her unlucky streak.
6 days ago