Phone theft is on the rise, with a significant increase reported in London last year, totaling 117,000 stolen smartphones. The trend is anticipated to continue growing in 2025, given the high value of devices like iPhones, some of which are priced at over £1,200. Beyond the financial loss, the theft of personal data stored on these devices, including photos, bank information, and private emails, is a major concern.
Despite the security measures implemented by Apple, such as Stolen Device Protection, thieves are still attempting to use stolen iPhones. Criminals have devised a deceptive method to bypass features like Activation Lock, a security function that ties an iPhone to the owner’s Apple ID, rendering it unusable and unsellable. This feature ensures that a password is mandatory for actions like turning off Find My, erasing the device, or reactivating it after being lost or stolen.
According to the National Cyber Security Centre in Switzerland, scammers are sending customized texts to the owners of stolen iPhones, directing them to a fake Apple website to extract personal data and disable Activation Lock. The scam messages appear to be from Apple, claiming that the lost device has been located abroad and providing specific details about the device to add credibility to the scam.
The NCSC has raised concerns over how criminals obtain users’ phone numbers, speculating that they may be exploiting information from SIM cards or Apple’s Find My feature, which allows owners to display contact details on a lost device’s lock screen.
To safeguard iPhone users, the NCSC has issued five crucial tips, emphasizing caution against responding to unsolicited messages and providing personal information. Users are advised to take immediate action, like enabling Lost Mode through the Find My app or iCloud.com/find, in case of a lost device. Additionally, protecting the SIM card with a PIN is recommended to prevent unauthorized access to phone numbers.
Remember, Apple will never initiate contact via text message or email to notify users about a found device. It is essential to be vigilant and follow security protocols to avoid falling victim to such scams.
