How does hacking the iPhone with iCloud protection

An interesting post appeared on the network about how hackers use sets
to bypass passwords and fake

requests for hacking a stolen iPhone with Activation Lock protection.

Activation Lock and Find iPhone are two very significant features that help fight off
stealing the iPhone by doing
their worthless to thieves.

When you turn on the Find iPhone feature, the Activation Lock is automatically activated. This protection does not
allow someone other than you to use your iPhone, iPad,
iPod touch or
Apple Watch if they don't know your
iCloud password

Activation Lock requires
iCloud password even after
reset and restore device as new. Some hackers try
bypass this protection, but it is not so easy. However, especially smart
fraudsters still found some sophisticated ways not only to circumvent, but even
disable activation lock.

The so-called iCloud unlock is the wholeindustry for fraudsters and criminals. They use fake requests to convince Apple that they are device owners. Information fraudsters take from databases.

There are even special kits that are and used to steal passwords from iCloud. They can be used for different purposes: theft of banking information, email data, other accounts, etc. But their main goal is to hack iCloud accounts.

In the iCloud hacking kit, there are templates foriPhone owners belief that the device was found. Hackers can send messages on behalf of Apple, luring users to their iCloud login details.

Kits can even generate fake cards withthe location of the victim’s smartphone. Hackers track several victims at once and receive alerts about successful hacking. Some kits do not even require technical configuration.

When password
stolen, Activation Lock can be simply disabled. Are standing
kits for hacking from 75 dollars.

the way is to forge documents and deceive the Apple Store in order
smartphone to unlock support.

Hackers fake a request, carry it to the Apple Store and say: "I forgot my Apple ID data, but I have a request!"

Experts do not take on such matters, but many go for it. One fake
the request costs 150 dollars, with the purchase of two you get a discount.

Scammers get special forms forrequests, filled with real information about the smartphone, as the IMEI number and date of purchase. They then contact Apple Support to remove iCloud protection. Sometimes you don’t even need to go to the Apple store, you can even unlock iCloud protection using email. However, this only works with devices that have not been claimed to be stolen.

There are also
third method.

The central iPhone process can be removed fromlogic board and programmed to essentially create a “new” device. This method is the most difficult and is less common. So they are engaged in the Chinese factories for the repair of devices, which are then sold as "refurbished".

Below you
You can see a demonstration of this method.

Not all iPhones with iCloud protection

Crabslist and other sites sell a lot on eBaysmartphones "protected by iCloud" or "for parts". Most of them are stolen, but not all. Such devices are sold by operators at their private auctions.

Sometimes upgrade program members return their smartphones to operators
and they don't always turn off Activation Lock. In this regard, the companies have no other
options besides selling.

It is unclear whether the operators themselves can remove iCloud protection from the iPhone, and whether Apple helps them with this.

This is where hackers come in. Operators sell huge quantities
blocked devices, and hackers buy them out and get income from it. To operators
It would be very useful to remove the iCloud protection, but this is very disadvantageous for Apple.