A partnering of European and Latin American law enforcement agencies took down the group behind the mobile phone credential theft of 483,000 victims.
Someone steals a physical mobile phone and they need to unlock it. But to do so, you need the Apple ID or Google account of the phone’s owner. So, where do you go? Well, it used to be iServer – an automated phishing-as-a-service platform that could harvest credentials to unlock the stolen phones.
According to security vendor Group-IB, who participated in Operation Kaerb, iServer used a web interface to help “low-skilled criminals, known as ‘unlockers" to steal device details passwords, user credentials from cloud-based mobile platforms and other personal information from victims through text messages like the one below:
Source: Group-IB
The intent was to provide the unlocker with enough details to allow them to bypass “Lost Mode” and unlock the stolen phone.
In a recent press release, Group IB announced the successful arrest of 17 individuals across Latin America and in Spain last month, putting a 5-year run to an end.
The very existence of such a platform demonstrates how cunning cybercriminals can be in creating solutions that meet a malicious need – such as unlocking a stolen phone. The phishing attacks rely on social engineering and a less-than-vigilant phone owner. Through proper security awareness training individuals can be taught to maintain that sense of vigilance – even after a traumatic event like having your phone stolen.
KnowBe4 empowers your workforce to make smarter security decisions every day. Over 70,000 organizations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.