New Apple Phone Vulnerability: Fraudsters May Exploit Customizable Portraits

No time to read?
Get a summary

Shamil Magomedov, the Head of the Department of Intelligent Information Security Systems at RTU MIREA Institute of Cyber Security and Digital Technologies, highlighted a newly identified vulnerability in Apple’s operating systems that could be exploited by fraudsters. The agency notes that this vulnerability has already been described as a potential trigger for targeted scams.

Magomedov explained that the latest iPhone firmware includes a feature that allows the portrait of a contact to be customized. In practice, attackers could configure the displayed contact with misleading details, potentially impersonating a police or supervisory authority and presenting a counterfeit identity to the recipient.

He stressed that the databases used by caller ID and smartphone apps to recognize incoming calls are not updated in real time. This lag means a suspicious call might not be flagged as a threat by the time the recipient answers, increasing the chances of successful manipulation.

Magomedov advised caution and practical steps to reduce risk. He suggested avoiding conversations with unfamiliar numbers and, when a caller claims to be a law enforcement official, insisting on a direct in-person meeting or a call back to an official departmental number to verify the claim.

Pavel Myasoedov, who previously served as the director of IT-Reserve, noted that smartphone users and banking app customers face various hacker techniques designed to extract money or sensitive information. He pointed out that new methods continue to emerge, including tactics that exploit the trust placed in familiar institutions or official-looking communications.

The discussion also referenced evolving schemes related to SIM card manipulation. Fraudsters have explored approaches to compromise mobile identity through SIM swaps, a technique that can grant unauthorized access to messages and verification codes, enabling further fraudulent activity. Ongoing research and monitoring emphasize the importance of strong authentication practices and user education to deter such attacks.

No time to read?
Get a summary
Previous Article

Japan Shifts METI Leadership Amid Political Donations Scrutiny

Next Article

Bonapartists and the Rise of Napoleon III: From Revolution to Empire