Security News > 2021 > November > Ukraine arrests ‘Phoenix’ hackers behind Apple phishing attacks

The Security Service of Ukraine has arrested five members of the international 'Phoenix' hacking group who specialize in the remote hacking of mobile devices.
The goal of 'Phoenix' was to gain remote access to the accounts of mobile device users and then monetize them by hijacking their e-payment or bank accounts or selling their private information to third parties.
To steal mobile accounts of mobile device users, the actors used phishing sites that were clones of Apple's and Samsung's login portals.
The hackers also offered remote mobile phone hacking services to others, charging between $100 and $200. Finally, the group was also unlocking stolen or lost devices made by Apple, tied to the original purchaser by locking them to the first account created on the device.
The police have conducted five searches in each arrest location, seizing computer equipment, mobile phones, specialized software, and hardware.
Ukraine has been actively cracking down on cybercrime activity originating from their country, with recent arrests of ransomware members, money launderers, and threat actors behind DDoS attacks.
News URL
Related news
- Microsoft: Hackers steal emails in device code phishing attacks (source)
- Chinese hackers targeted sanctions office in Treasury attack (source)
- Phishing texts trick Apple iMessage users into disabling protection (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Hackers use FastHTTP in new high-speed Microsoft 365 password attacks (source)
- Ransomware gangs pose as IT support in Microsoft Teams phishing attacks (source)
- Microsoft Teams phishing attack alerts coming to everyone next month (source)
- New Apple CPU side-channel attacks steal data from browsers (source)
- New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits (source)
- Google says hackers abuse Gemini AI to empower their attacks (source)