logoalt Hacker News

WhyNotHugotoday at 11:42 AM1 replyview on HN

What's the end goal here?

I know that after a phone has been stolen, attackers want to gain access to an Apple account to remove the activation lock. But in this case, no devices had been stolen yet. The most they could do would be to… remotely mark the devices as stolen? Then ask the victim to pay to unlock them?


Replies

sdwrtoday at 3:13 PM

Get into the account, change the phone number, and start charging the cards on file. Or look through iCloud data for passwords/contacts