AAPL Stock: 132.2 ( + 2.58 )

Printed from

Hacker attempts to extort Dutch iPhone owners

updated 03:10 pm EST, Tue November 3, 2009

Exposes security vulnerability

A hacker in the Netherlands has attempted to extort several iPhone owners, reports say. The hacker is believed to have used port scanning to identify T-Mobile-branded phones running SSH, commonly used in jailbreaking techniques. Because many people do not change the default root password on jailbroken devices, the hacker was able to take control of iPhones, and send custom text messages warning them to visit a website in order to resecure their firmware.

Once at the website,, victims were asked to send 5 to a PayPal account in exchange for instructions on closing the vulnerability. "If you don't pay, it's fine by me," the hacker claims. "But remember, the way I got access to your iPhone can be used by thousands of others -- they can send text messages from your number (like I did), use it to call or record your calls, and actually whatever they want, even use it for their hacking activities! I can assure you, I have no intention of harming you or whatever, but, some hackers do! It's just my advice to secure your phone."

Apple has taken a strict stance against jailbreaking, going as far as to call it illegal under the DMCA. New firmware updates from the company regularly disrupt jailbreaking tools. While critics have charged that Apple is locking down devices for its own profit, the company has defended itself by pointing to the increased security risks posed by allowing easy access.

by MacNN Staff





  1. bjojade

    Joined: Dec 1969


    Ha ha ha.


  1. Grrr

    Joined: Dec 1969


    Thats hacks for you!

    I can't say im surprised. Thats the nature of hacks.
    Don't say Apple didn't warn people..

  1. dmwalsh568

    Joined: Dec 1969


    Not extortion

    In the immortal words of Inigo Montoya, I do not think that word means what you think it means. ;)

    If the story is true as written then this isn't extortion. It can be called hacking since access to the device was not granted, but the hacker didn't hold anything for ransom or threaten to expose anything...he or she just offered to give directions on how to protect the firmware from other hackers.

Login Here

Not a member of the MacNN forums? Register now for free.


Network Headlines

Follow us on Facebook


Most Popular


Recent Reviews

Notti smart lamp from Witti

Perhaps you've already seen our review of the Dotti LED display from Witti Design. Meet Notti, Dotti's "sibling". Notti is a softb ...

Seagate Personal Cloud (2-Bay)

When it comes to backing up files, many users are now looking to the myriad of cloud storage solutions available. There is no doubt th ...

Leitz Icon Label Printer

When you say the words "label printer" to people, they either just really don't care, or they get incredibly excited. This is one o ...


Most Commented