The iPhone is currently one of the most popular mobile devices, but it's also a prime target for thieves. Aaron Johnson, a 26-year-old, has stolen hundreds of iPhones in Minneapolis, USA over the past two years. He has revealed his cunning methods, shocking many. Johnson isn't a professional cybercriminal, just an ordinary pickpocket.
The iPhone is currently one of the most popular mobile devices.He targets young people in bars, as they often use the Pro Series iPhones with the distinctive '3-eyed' feature. These are high-value devices, selling for up to $900 for a 1TB Pro Max. Johnson claims he can earn $20,000 every weekend by selling iPhones, not to mention the money he obtains from banking apps, Pay, and other services of his victims.
To acquire the victim's iPhone, Johnson uses the tactic of befriending them. He appears friendly, cheerful, and dynamic, even claiming to be a rapper and wanting to connect on Snapchat. After chatting for a while, he'll ask to borrow the victim's phone to enter information. Then, he'll ask for the victim's unlock code and memorize or record it. Afterward, he'll keep the phone on himself or pass it to his accomplices.
Johnson will swiftly change the Apple ID password and disable Find my iPhoneAfter obtaining the iPhone and the victim's password, Johnson will swiftly change the Apple ID password and disable Find My iPhone to prevent the victim from locating their device. He will also use the password to unlock the phone and access the victim's banking apps, Apple Pay, and other services, then transfer money from these accounts to others or purchase gift cards to sell. He will also delete the victim's personal data from the phone to avoid detection.
Johnson not only uses the unlock password to access the victim's iPhone but also their face to authenticate into Face ID. This security feature allows users to unlock their phones by looking at the front camera. Johnson takes advantage of moments when the victim is drunk or nodding off to bring the phone close to their face and capture their facial features.
Johnson will transfer money and go to stores to make purchases using Apple PayAfter verifying Face ID, Johnson will be able to quickly access passwords stored in iCloud Keychain. This feature allows users to store and synchronize passwords for apps and websites across Apple devices. Johnson will use these passwords to log into savings, securities, cryptocurrencies apps, and transfer all the money out. He will also search for sensitive information, such as Social Security numbers, in Notes and Photos apps if he encounters difficulties accessing those apps.
Next, Johnson will transfer money and go to stores to make purchases using Apple Pay. This is a contactless payment service that allows users to pay with iPhone or at NFC scanners. He will use Face ID or a password to confirm the transaction, without needing a credit card or cash. He will buy expensive items like electronics, clothing, jewelry, to later sell for cash.
He also utilizes stolen Apple devices to acquire more Apple products such as iPhone, iPad, AirPods, Apple Watch, and then sells them for cash. Johnson employs different Apple ID accounts to purchase these devices, to evade tracking, and also alters personal information, such as name, address, phone number, on these accounts, to avoid detection.
Johnson will sell the stolen iPhone to a specialized trafficker abroad after wiping all data on itFinally, Johnson will sell the iPhone to a specialized trafficker abroad after wiping all data on it. This is a strategy for Johnson to evade police capture, as the iPhone will no longer appear on Apple's system. Currently, he is facing a 94-month sentence for iPhone theft and causing over $300,000 in damages to intoxicated male students in bars and clubs.
Through this narrative, not only iPhone users but also users of similarly expensive phones should equip themselves with knowledge and avoid allowing strangers access to their phones when not sober to prevent harm. Additionally, after losing a phone, which often contains a lot of personal information as well as payment cards, users should contact their banks or financial providers to immediately terminate services before criminals can use the money in your account.
Read more:- After Europe, Japan will also require Apple to allow third-party app installations
- Apple fails to make top smartphone market share in India, what's happening?
- Explore Category Articles
