Caramelle dagli sconosciuti

The first step is to send a spoofed Apple email or SMS message, notifying the victim that their device has been recovered. No doubt desperate to get their device back, the victim then clicks on a link which requires their iCloud account credentials.

These stolen details are then used to access and compromise the iCloud account and re-used to unlock the stolen iPhone — cutting off the potential of remotely tracking the iPhone or bricking it entirely.

How criminals clear your stolen iPhone for resale | ZDNet

Perché, qualunque cosa accada, in certe situazioni non dovreste mai cliccare su un link.

Stay Tuned,
Mr.Frost