How to be mean to some people that stole my phone [closed]
My iPhone was stolen a couple of weeks ago and I started receiving the following messages on my recovery secondary number that I provided with Find My iPhone:
The URLs are:
https://apple.inc-view.us/?auth=3455
https://apple.inc-locate.us/verify.php?ID=&auth=325&vr=
And they mimic the interface of Find My iPhone where they're asking me for my Apple ID credentials. I logged into Apple ID and the phone hasn't registered since it was stolen.
Wondering if there's something I can do to track them down or be mean to them.
spoofing identity-theft
closed as off-topic by Xander, forest, Steffen Ullrich, Dmitry Grigoryev, Matthew Jan 9 at 15:02
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "This question does not appear to be about Information security within the scope defined in the help center." – Xander, forest, Steffen Ullrich, Dmitry Grigoryev, Matthew
If this question can be reworded to fit the rules in the help center, please edit the question.
add a comment |
My iPhone was stolen a couple of weeks ago and I started receiving the following messages on my recovery secondary number that I provided with Find My iPhone:
The URLs are:
https://apple.inc-view.us/?auth=3455
https://apple.inc-locate.us/verify.php?ID=&auth=325&vr=
And they mimic the interface of Find My iPhone where they're asking me for my Apple ID credentials. I logged into Apple ID and the phone hasn't registered since it was stolen.
Wondering if there's something I can do to track them down or be mean to them.
spoofing identity-theft
closed as off-topic by Xander, forest, Steffen Ullrich, Dmitry Grigoryev, Matthew Jan 9 at 15:02
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "This question does not appear to be about Information security within the scope defined in the help center." – Xander, forest, Steffen Ullrich, Dmitry Grigoryev, Matthew
If this question can be reworded to fit the rules in the help center, please edit the question.
5
I’m curious how they would have got this number unless you’ve been the victim of a very targeted attack’s (I.e. iCloud account hacked and your phone stolen).
– Darren
Jan 9 at 7:25
1
So the thieves are sending you these spoofed messages to phish for your credentials?
– henning
Jan 9 at 13:42
add a comment |
My iPhone was stolen a couple of weeks ago and I started receiving the following messages on my recovery secondary number that I provided with Find My iPhone:
The URLs are:
https://apple.inc-view.us/?auth=3455
https://apple.inc-locate.us/verify.php?ID=&auth=325&vr=
And they mimic the interface of Find My iPhone where they're asking me for my Apple ID credentials. I logged into Apple ID and the phone hasn't registered since it was stolen.
Wondering if there's something I can do to track them down or be mean to them.
spoofing identity-theft
My iPhone was stolen a couple of weeks ago and I started receiving the following messages on my recovery secondary number that I provided with Find My iPhone:
The URLs are:
https://apple.inc-view.us/?auth=3455
https://apple.inc-locate.us/verify.php?ID=&auth=325&vr=
And they mimic the interface of Find My iPhone where they're asking me for my Apple ID credentials. I logged into Apple ID and the phone hasn't registered since it was stolen.
Wondering if there's something I can do to track them down or be mean to them.
spoofing identity-theft
spoofing identity-theft
edited Jan 8 at 17:40
Ahmed Abdelhameed
1033
1033
asked Jan 8 at 15:17
Evelin VelevEvelin Velev
13213
13213
closed as off-topic by Xander, forest, Steffen Ullrich, Dmitry Grigoryev, Matthew Jan 9 at 15:02
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "This question does not appear to be about Information security within the scope defined in the help center." – Xander, forest, Steffen Ullrich, Dmitry Grigoryev, Matthew
If this question can be reworded to fit the rules in the help center, please edit the question.
closed as off-topic by Xander, forest, Steffen Ullrich, Dmitry Grigoryev, Matthew Jan 9 at 15:02
This question appears to be off-topic. The users who voted to close gave this specific reason:
- "This question does not appear to be about Information security within the scope defined in the help center." – Xander, forest, Steffen Ullrich, Dmitry Grigoryev, Matthew
If this question can be reworded to fit the rules in the help center, please edit the question.
5
I’m curious how they would have got this number unless you’ve been the victim of a very targeted attack’s (I.e. iCloud account hacked and your phone stolen).
– Darren
Jan 9 at 7:25
1
So the thieves are sending you these spoofed messages to phish for your credentials?
– henning
Jan 9 at 13:42
add a comment |
5
I’m curious how they would have got this number unless you’ve been the victim of a very targeted attack’s (I.e. iCloud account hacked and your phone stolen).
– Darren
Jan 9 at 7:25
1
So the thieves are sending you these spoofed messages to phish for your credentials?
– henning
Jan 9 at 13:42
5
5
I’m curious how they would have got this number unless you’ve been the victim of a very targeted attack’s (I.e. iCloud account hacked and your phone stolen).
– Darren
Jan 9 at 7:25
I’m curious how they would have got this number unless you’ve been the victim of a very targeted attack’s (I.e. iCloud account hacked and your phone stolen).
– Darren
Jan 9 at 7:25
1
1
So the thieves are sending you these spoofed messages to phish for your credentials?
– henning
Jan 9 at 13:42
So the thieves are sending you these spoofed messages to phish for your credentials?
– henning
Jan 9 at 13:42
add a comment |
6 Answers
6
active
oldest
votes
Offensive defense is the type of attack you are looking to perform. You have been the victim of a technological crime, you are the target of a phishing campaign, and you want to get even. This is a very normal response and I can tell you that many organizations, governments, and individuals attempt this on their own daily. There is a major issue with any type of non-legal recourse, however.
Due to the anonymity of the internet, and the relative ease of using a botnet to do malicious activity, it can be really difficult to assure that you only hurt the people you intend to hurt. In attacking an individual through a network relay, you may end up shutting down your own grand mother's computer which is less than ideal and totally irrelevant to the initial attackers. The only truly legal recourse is to co-ordinate with your local authorities and attempt to gain information back on the attackers.
If you can glean any information from your cowardly attackers that may indicate name or location you can use this to work with the authorities. Also, if the phone is on, you can still attempt to use the "Find My Phone" feature to track down it's current location alongside the proper authorities (I do not recommend confronting thieves on your own or without legal support).
In the end, it really sucks that you're in this position and I have compassion for you. Know that your options are limited, but do take advantage of the ones you can so you have the peace of mind knowing you did all you could legally do. That will be far better than putting your self in the position of risking jail time over a device.
16
There are a few cases where hacking back is actually practical and profitable. This just isn't one of them.
– Tom
Jan 8 at 22:55
2
On top of causing unintended collateral damage, there's also the risk of OP getting in legal hot water themselves for computer-related crimes. Not to mention the possibility of exposing themselves to the attackers even more (and giving them incentive to follow up) by revealing other devices / IPs they own.
– Steve-O
Jan 9 at 14:34
add a comment |
I've just checked on Whois.us. Both domains are registered to the same person, with a stated address in London.
Try talking to the internet fraud team from your local police. Chances are they're overworked, but if they've got some free time then they may be able to go to TLDsolutions.com and trace the payments. For most countries this would be a dead loss, but US ISPs have to keep records and play nicely with police requests. So they may have screwed up by using a .us domain.
lazy thieves making this too easy....
– sudo rm -rf slash
Jan 9 at 7:59
2
@Graham the fact the domain name ends in.us
doesn't mean it has anything to do with the USA? Anyone can register any domain they want and locate the server anywhere they want in the world
– user1
Jan 9 at 8:47
10
@user1 Sure, but the provider who registered the domain is based in the US. Regardless of where the criminal's server is located, at some point they've had to pay a provider in the US to get that domain name. Which means there's a money trail from the criminal to the provider, and a provider in the US will honour requests from the police. Of course there are ways around that money trail - prepaid disposable credit cards are a thing, for example - but it's worth checking.
– Graham
Jan 9 at 10:09
ahh that makes perfect sense. Thanks for clarifying
– user1
Jan 9 at 12:08
2
The attackers might have assumed that their details were protected by WHOISguard (which is enabled for free on all domains registered on namecheap (and other registrars)) but the.us
TLD is actually not eligible for whiosguard, for whatever reason.
– rahuldottech
Jan 9 at 13:57
add a comment |
Call the police and sue them in court! That will show them you can be mean. Moreover, it will be legal and you will stay out of trouble.
31
Sue who? He doesn't know who they are and the fake "Find my phone" messages won't help. He could try to get the phone location records from the phone company based on cell tower hits, but even if he finds the general location of the phone, he still has to find out who has it. He can call the police, but in my experience, there's little chance of getting them to investigate a single stolen phone.
– Johnny
Jan 8 at 22:12
5
It's probably worth mentioning that the original question doesn't specify that the alerts are fake. At first glance this isn't obvious.
– Tom W
Jan 9 at 10:11
add a comment |
The attackers are skilled enough to not enable the phone and to set up a fake Find My iPhone site. This clearly shows they understand fairly well how the iPhones security features work and are trying to trick you into revealing the credentials that will let them get around those.
Unless you are highly skilled yourself, they probably have the upper hand in this. The fact that they reach out to you like that shows they are willing to take a (small) risk to get your credentials, so your best bet is to not give them what they want. It is unlikely that you will find a trick that they didn't anticipate, and more likely that in trying you would give them information they can use.
You should get the IMEI blacklisted, if you haven't yet. This is the best effort to make the phone useless for the thieves. With any luck, they'll ditch it somewhere, someone else finds it and turns it on, and it will show up on Find My iPhone.
6
If you get the IMEI blacklisted, couldn't that prevent it from connecting to the internet and therefore prevent it from connecting to the Find My iPhone service?
– Nonny Moose
Jan 9 at 0:07
1
It won't work on wireless, but unless I am mistaken, it should work on a Wifi and report in.
– Tom
Jan 9 at 8:49
1
@Tom Don't you have to have access to the phone to connect it to a WiFi network? At least where I'm from, widely available open WiFi services that grant internet access without user interaction are not a thing. So the phone would very likely not find anything to connect to.
– Alexander Kosubek
Jan 9 at 13:33
1
That could be true. I think you can connect to wifi from the swipe-upwards screen, but I'm not sure if it allows you to connect to a new network.
– Tom
Jan 9 at 13:44
add a comment |
This message is coming from an 'abundance of caution' so that you understand that you may be engaging in something that may be dangerous (organized / violent criminals). The other postings indicate that the messages are from reasonably sophisticated thieves that are fishing for your info.
Escalating ("being mean") is potentially dangerous unless you are sure you understand who 1) stole and 2) has custody of your phone. There is a non-zero chance that they know who you are, since it is your phone. The phone may have been transferred to dangerous criminals. If you know someone at GCHQ, maybe they could take it on as a pet project.
It is understandable that you would like to get your phone back and even a little karma payback: your safer bet is to work with the authorities: just make it easy for the authority to catch the thief.
add a comment |
Something you could do is to pretend to give them what they want. Go to their site and enter some fake credentials. They might grab those and try them on your phone or on a computer, which might reveal some information about them, like time and IP address of a failed log in attempt, maybe even location of the device.
Just be extra careful (isolated browser (in a virtual machine), plug-ins disabled, security settings to maximum, anti virus on-access scan enabled,...) when visiting their site to not fall victim to other malware they may be trying to push to you. (Not very nice, but you could use an internet cafe's computer for that. In the worst case, this computer gets infected, but since there's no personal data on it it's not a very big deal to just scrub it and put a fresh image on it; which they might do routinely anyway.)
Or use a text-only browser
– Kelly S. French
Jan 9 at 15:57
add a comment |
6 Answers
6
active
oldest
votes
6 Answers
6
active
oldest
votes
active
oldest
votes
active
oldest
votes
Offensive defense is the type of attack you are looking to perform. You have been the victim of a technological crime, you are the target of a phishing campaign, and you want to get even. This is a very normal response and I can tell you that many organizations, governments, and individuals attempt this on their own daily. There is a major issue with any type of non-legal recourse, however.
Due to the anonymity of the internet, and the relative ease of using a botnet to do malicious activity, it can be really difficult to assure that you only hurt the people you intend to hurt. In attacking an individual through a network relay, you may end up shutting down your own grand mother's computer which is less than ideal and totally irrelevant to the initial attackers. The only truly legal recourse is to co-ordinate with your local authorities and attempt to gain information back on the attackers.
If you can glean any information from your cowardly attackers that may indicate name or location you can use this to work with the authorities. Also, if the phone is on, you can still attempt to use the "Find My Phone" feature to track down it's current location alongside the proper authorities (I do not recommend confronting thieves on your own or without legal support).
In the end, it really sucks that you're in this position and I have compassion for you. Know that your options are limited, but do take advantage of the ones you can so you have the peace of mind knowing you did all you could legally do. That will be far better than putting your self in the position of risking jail time over a device.
16
There are a few cases where hacking back is actually practical and profitable. This just isn't one of them.
– Tom
Jan 8 at 22:55
2
On top of causing unintended collateral damage, there's also the risk of OP getting in legal hot water themselves for computer-related crimes. Not to mention the possibility of exposing themselves to the attackers even more (and giving them incentive to follow up) by revealing other devices / IPs they own.
– Steve-O
Jan 9 at 14:34
add a comment |
Offensive defense is the type of attack you are looking to perform. You have been the victim of a technological crime, you are the target of a phishing campaign, and you want to get even. This is a very normal response and I can tell you that many organizations, governments, and individuals attempt this on their own daily. There is a major issue with any type of non-legal recourse, however.
Due to the anonymity of the internet, and the relative ease of using a botnet to do malicious activity, it can be really difficult to assure that you only hurt the people you intend to hurt. In attacking an individual through a network relay, you may end up shutting down your own grand mother's computer which is less than ideal and totally irrelevant to the initial attackers. The only truly legal recourse is to co-ordinate with your local authorities and attempt to gain information back on the attackers.
If you can glean any information from your cowardly attackers that may indicate name or location you can use this to work with the authorities. Also, if the phone is on, you can still attempt to use the "Find My Phone" feature to track down it's current location alongside the proper authorities (I do not recommend confronting thieves on your own or without legal support).
In the end, it really sucks that you're in this position and I have compassion for you. Know that your options are limited, but do take advantage of the ones you can so you have the peace of mind knowing you did all you could legally do. That will be far better than putting your self in the position of risking jail time over a device.
16
There are a few cases where hacking back is actually practical and profitable. This just isn't one of them.
– Tom
Jan 8 at 22:55
2
On top of causing unintended collateral damage, there's also the risk of OP getting in legal hot water themselves for computer-related crimes. Not to mention the possibility of exposing themselves to the attackers even more (and giving them incentive to follow up) by revealing other devices / IPs they own.
– Steve-O
Jan 9 at 14:34
add a comment |
Offensive defense is the type of attack you are looking to perform. You have been the victim of a technological crime, you are the target of a phishing campaign, and you want to get even. This is a very normal response and I can tell you that many organizations, governments, and individuals attempt this on their own daily. There is a major issue with any type of non-legal recourse, however.
Due to the anonymity of the internet, and the relative ease of using a botnet to do malicious activity, it can be really difficult to assure that you only hurt the people you intend to hurt. In attacking an individual through a network relay, you may end up shutting down your own grand mother's computer which is less than ideal and totally irrelevant to the initial attackers. The only truly legal recourse is to co-ordinate with your local authorities and attempt to gain information back on the attackers.
If you can glean any information from your cowardly attackers that may indicate name or location you can use this to work with the authorities. Also, if the phone is on, you can still attempt to use the "Find My Phone" feature to track down it's current location alongside the proper authorities (I do not recommend confronting thieves on your own or without legal support).
In the end, it really sucks that you're in this position and I have compassion for you. Know that your options are limited, but do take advantage of the ones you can so you have the peace of mind knowing you did all you could legally do. That will be far better than putting your self in the position of risking jail time over a device.
Offensive defense is the type of attack you are looking to perform. You have been the victim of a technological crime, you are the target of a phishing campaign, and you want to get even. This is a very normal response and I can tell you that many organizations, governments, and individuals attempt this on their own daily. There is a major issue with any type of non-legal recourse, however.
Due to the anonymity of the internet, and the relative ease of using a botnet to do malicious activity, it can be really difficult to assure that you only hurt the people you intend to hurt. In attacking an individual through a network relay, you may end up shutting down your own grand mother's computer which is less than ideal and totally irrelevant to the initial attackers. The only truly legal recourse is to co-ordinate with your local authorities and attempt to gain information back on the attackers.
If you can glean any information from your cowardly attackers that may indicate name or location you can use this to work with the authorities. Also, if the phone is on, you can still attempt to use the "Find My Phone" feature to track down it's current location alongside the proper authorities (I do not recommend confronting thieves on your own or without legal support).
In the end, it really sucks that you're in this position and I have compassion for you. Know that your options are limited, but do take advantage of the ones you can so you have the peace of mind knowing you did all you could legally do. That will be far better than putting your self in the position of risking jail time over a device.
answered Jan 8 at 18:29
Connor PeoplesConnor Peoples
1,175112
1,175112
16
There are a few cases where hacking back is actually practical and profitable. This just isn't one of them.
– Tom
Jan 8 at 22:55
2
On top of causing unintended collateral damage, there's also the risk of OP getting in legal hot water themselves for computer-related crimes. Not to mention the possibility of exposing themselves to the attackers even more (and giving them incentive to follow up) by revealing other devices / IPs they own.
– Steve-O
Jan 9 at 14:34
add a comment |
16
There are a few cases where hacking back is actually practical and profitable. This just isn't one of them.
– Tom
Jan 8 at 22:55
2
On top of causing unintended collateral damage, there's also the risk of OP getting in legal hot water themselves for computer-related crimes. Not to mention the possibility of exposing themselves to the attackers even more (and giving them incentive to follow up) by revealing other devices / IPs they own.
– Steve-O
Jan 9 at 14:34
16
16
There are a few cases where hacking back is actually practical and profitable. This just isn't one of them.
– Tom
Jan 8 at 22:55
There are a few cases where hacking back is actually practical and profitable. This just isn't one of them.
– Tom
Jan 8 at 22:55
2
2
On top of causing unintended collateral damage, there's also the risk of OP getting in legal hot water themselves for computer-related crimes. Not to mention the possibility of exposing themselves to the attackers even more (and giving them incentive to follow up) by revealing other devices / IPs they own.
– Steve-O
Jan 9 at 14:34
On top of causing unintended collateral damage, there's also the risk of OP getting in legal hot water themselves for computer-related crimes. Not to mention the possibility of exposing themselves to the attackers even more (and giving them incentive to follow up) by revealing other devices / IPs they own.
– Steve-O
Jan 9 at 14:34
add a comment |
I've just checked on Whois.us. Both domains are registered to the same person, with a stated address in London.
Try talking to the internet fraud team from your local police. Chances are they're overworked, but if they've got some free time then they may be able to go to TLDsolutions.com and trace the payments. For most countries this would be a dead loss, but US ISPs have to keep records and play nicely with police requests. So they may have screwed up by using a .us domain.
lazy thieves making this too easy....
– sudo rm -rf slash
Jan 9 at 7:59
2
@Graham the fact the domain name ends in.us
doesn't mean it has anything to do with the USA? Anyone can register any domain they want and locate the server anywhere they want in the world
– user1
Jan 9 at 8:47
10
@user1 Sure, but the provider who registered the domain is based in the US. Regardless of where the criminal's server is located, at some point they've had to pay a provider in the US to get that domain name. Which means there's a money trail from the criminal to the provider, and a provider in the US will honour requests from the police. Of course there are ways around that money trail - prepaid disposable credit cards are a thing, for example - but it's worth checking.
– Graham
Jan 9 at 10:09
ahh that makes perfect sense. Thanks for clarifying
– user1
Jan 9 at 12:08
2
The attackers might have assumed that their details were protected by WHOISguard (which is enabled for free on all domains registered on namecheap (and other registrars)) but the.us
TLD is actually not eligible for whiosguard, for whatever reason.
– rahuldottech
Jan 9 at 13:57
add a comment |
I've just checked on Whois.us. Both domains are registered to the same person, with a stated address in London.
Try talking to the internet fraud team from your local police. Chances are they're overworked, but if they've got some free time then they may be able to go to TLDsolutions.com and trace the payments. For most countries this would be a dead loss, but US ISPs have to keep records and play nicely with police requests. So they may have screwed up by using a .us domain.
lazy thieves making this too easy....
– sudo rm -rf slash
Jan 9 at 7:59
2
@Graham the fact the domain name ends in.us
doesn't mean it has anything to do with the USA? Anyone can register any domain they want and locate the server anywhere they want in the world
– user1
Jan 9 at 8:47
10
@user1 Sure, but the provider who registered the domain is based in the US. Regardless of where the criminal's server is located, at some point they've had to pay a provider in the US to get that domain name. Which means there's a money trail from the criminal to the provider, and a provider in the US will honour requests from the police. Of course there are ways around that money trail - prepaid disposable credit cards are a thing, for example - but it's worth checking.
– Graham
Jan 9 at 10:09
ahh that makes perfect sense. Thanks for clarifying
– user1
Jan 9 at 12:08
2
The attackers might have assumed that their details were protected by WHOISguard (which is enabled for free on all domains registered on namecheap (and other registrars)) but the.us
TLD is actually not eligible for whiosguard, for whatever reason.
– rahuldottech
Jan 9 at 13:57
add a comment |
I've just checked on Whois.us. Both domains are registered to the same person, with a stated address in London.
Try talking to the internet fraud team from your local police. Chances are they're overworked, but if they've got some free time then they may be able to go to TLDsolutions.com and trace the payments. For most countries this would be a dead loss, but US ISPs have to keep records and play nicely with police requests. So they may have screwed up by using a .us domain.
I've just checked on Whois.us. Both domains are registered to the same person, with a stated address in London.
Try talking to the internet fraud team from your local police. Chances are they're overworked, but if they've got some free time then they may be able to go to TLDsolutions.com and trace the payments. For most countries this would be a dead loss, but US ISPs have to keep records and play nicely with police requests. So they may have screwed up by using a .us domain.
answered Jan 9 at 1:14
GrahamGraham
35925
35925
lazy thieves making this too easy....
– sudo rm -rf slash
Jan 9 at 7:59
2
@Graham the fact the domain name ends in.us
doesn't mean it has anything to do with the USA? Anyone can register any domain they want and locate the server anywhere they want in the world
– user1
Jan 9 at 8:47
10
@user1 Sure, but the provider who registered the domain is based in the US. Regardless of where the criminal's server is located, at some point they've had to pay a provider in the US to get that domain name. Which means there's a money trail from the criminal to the provider, and a provider in the US will honour requests from the police. Of course there are ways around that money trail - prepaid disposable credit cards are a thing, for example - but it's worth checking.
– Graham
Jan 9 at 10:09
ahh that makes perfect sense. Thanks for clarifying
– user1
Jan 9 at 12:08
2
The attackers might have assumed that their details were protected by WHOISguard (which is enabled for free on all domains registered on namecheap (and other registrars)) but the.us
TLD is actually not eligible for whiosguard, for whatever reason.
– rahuldottech
Jan 9 at 13:57
add a comment |
lazy thieves making this too easy....
– sudo rm -rf slash
Jan 9 at 7:59
2
@Graham the fact the domain name ends in.us
doesn't mean it has anything to do with the USA? Anyone can register any domain they want and locate the server anywhere they want in the world
– user1
Jan 9 at 8:47
10
@user1 Sure, but the provider who registered the domain is based in the US. Regardless of where the criminal's server is located, at some point they've had to pay a provider in the US to get that domain name. Which means there's a money trail from the criminal to the provider, and a provider in the US will honour requests from the police. Of course there are ways around that money trail - prepaid disposable credit cards are a thing, for example - but it's worth checking.
– Graham
Jan 9 at 10:09
ahh that makes perfect sense. Thanks for clarifying
– user1
Jan 9 at 12:08
2
The attackers might have assumed that their details were protected by WHOISguard (which is enabled for free on all domains registered on namecheap (and other registrars)) but the.us
TLD is actually not eligible for whiosguard, for whatever reason.
– rahuldottech
Jan 9 at 13:57
lazy thieves making this too easy....
– sudo rm -rf slash
Jan 9 at 7:59
lazy thieves making this too easy....
– sudo rm -rf slash
Jan 9 at 7:59
2
2
@Graham the fact the domain name ends in
.us
doesn't mean it has anything to do with the USA? Anyone can register any domain they want and locate the server anywhere they want in the world– user1
Jan 9 at 8:47
@Graham the fact the domain name ends in
.us
doesn't mean it has anything to do with the USA? Anyone can register any domain they want and locate the server anywhere they want in the world– user1
Jan 9 at 8:47
10
10
@user1 Sure, but the provider who registered the domain is based in the US. Regardless of where the criminal's server is located, at some point they've had to pay a provider in the US to get that domain name. Which means there's a money trail from the criminal to the provider, and a provider in the US will honour requests from the police. Of course there are ways around that money trail - prepaid disposable credit cards are a thing, for example - but it's worth checking.
– Graham
Jan 9 at 10:09
@user1 Sure, but the provider who registered the domain is based in the US. Regardless of where the criminal's server is located, at some point they've had to pay a provider in the US to get that domain name. Which means there's a money trail from the criminal to the provider, and a provider in the US will honour requests from the police. Of course there are ways around that money trail - prepaid disposable credit cards are a thing, for example - but it's worth checking.
– Graham
Jan 9 at 10:09
ahh that makes perfect sense. Thanks for clarifying
– user1
Jan 9 at 12:08
ahh that makes perfect sense. Thanks for clarifying
– user1
Jan 9 at 12:08
2
2
The attackers might have assumed that their details were protected by WHOISguard (which is enabled for free on all domains registered on namecheap (and other registrars)) but the
.us
TLD is actually not eligible for whiosguard, for whatever reason.– rahuldottech
Jan 9 at 13:57
The attackers might have assumed that their details were protected by WHOISguard (which is enabled for free on all domains registered on namecheap (and other registrars)) but the
.us
TLD is actually not eligible for whiosguard, for whatever reason.– rahuldottech
Jan 9 at 13:57
add a comment |
Call the police and sue them in court! That will show them you can be mean. Moreover, it will be legal and you will stay out of trouble.
31
Sue who? He doesn't know who they are and the fake "Find my phone" messages won't help. He could try to get the phone location records from the phone company based on cell tower hits, but even if he finds the general location of the phone, he still has to find out who has it. He can call the police, but in my experience, there's little chance of getting them to investigate a single stolen phone.
– Johnny
Jan 8 at 22:12
5
It's probably worth mentioning that the original question doesn't specify that the alerts are fake. At first glance this isn't obvious.
– Tom W
Jan 9 at 10:11
add a comment |
Call the police and sue them in court! That will show them you can be mean. Moreover, it will be legal and you will stay out of trouble.
31
Sue who? He doesn't know who they are and the fake "Find my phone" messages won't help. He could try to get the phone location records from the phone company based on cell tower hits, but even if he finds the general location of the phone, he still has to find out who has it. He can call the police, but in my experience, there's little chance of getting them to investigate a single stolen phone.
– Johnny
Jan 8 at 22:12
5
It's probably worth mentioning that the original question doesn't specify that the alerts are fake. At first glance this isn't obvious.
– Tom W
Jan 9 at 10:11
add a comment |
Call the police and sue them in court! That will show them you can be mean. Moreover, it will be legal and you will stay out of trouble.
Call the police and sue them in court! That will show them you can be mean. Moreover, it will be legal and you will stay out of trouble.
answered Jan 8 at 15:56
A. HerseanA. Hersean
4,85031022
4,85031022
31
Sue who? He doesn't know who they are and the fake "Find my phone" messages won't help. He could try to get the phone location records from the phone company based on cell tower hits, but even if he finds the general location of the phone, he still has to find out who has it. He can call the police, but in my experience, there's little chance of getting them to investigate a single stolen phone.
– Johnny
Jan 8 at 22:12
5
It's probably worth mentioning that the original question doesn't specify that the alerts are fake. At first glance this isn't obvious.
– Tom W
Jan 9 at 10:11
add a comment |
31
Sue who? He doesn't know who they are and the fake "Find my phone" messages won't help. He could try to get the phone location records from the phone company based on cell tower hits, but even if he finds the general location of the phone, he still has to find out who has it. He can call the police, but in my experience, there's little chance of getting them to investigate a single stolen phone.
– Johnny
Jan 8 at 22:12
5
It's probably worth mentioning that the original question doesn't specify that the alerts are fake. At first glance this isn't obvious.
– Tom W
Jan 9 at 10:11
31
31
Sue who? He doesn't know who they are and the fake "Find my phone" messages won't help. He could try to get the phone location records from the phone company based on cell tower hits, but even if he finds the general location of the phone, he still has to find out who has it. He can call the police, but in my experience, there's little chance of getting them to investigate a single stolen phone.
– Johnny
Jan 8 at 22:12
Sue who? He doesn't know who they are and the fake "Find my phone" messages won't help. He could try to get the phone location records from the phone company based on cell tower hits, but even if he finds the general location of the phone, he still has to find out who has it. He can call the police, but in my experience, there's little chance of getting them to investigate a single stolen phone.
– Johnny
Jan 8 at 22:12
5
5
It's probably worth mentioning that the original question doesn't specify that the alerts are fake. At first glance this isn't obvious.
– Tom W
Jan 9 at 10:11
It's probably worth mentioning that the original question doesn't specify that the alerts are fake. At first glance this isn't obvious.
– Tom W
Jan 9 at 10:11
add a comment |
The attackers are skilled enough to not enable the phone and to set up a fake Find My iPhone site. This clearly shows they understand fairly well how the iPhones security features work and are trying to trick you into revealing the credentials that will let them get around those.
Unless you are highly skilled yourself, they probably have the upper hand in this. The fact that they reach out to you like that shows they are willing to take a (small) risk to get your credentials, so your best bet is to not give them what they want. It is unlikely that you will find a trick that they didn't anticipate, and more likely that in trying you would give them information they can use.
You should get the IMEI blacklisted, if you haven't yet. This is the best effort to make the phone useless for the thieves. With any luck, they'll ditch it somewhere, someone else finds it and turns it on, and it will show up on Find My iPhone.
6
If you get the IMEI blacklisted, couldn't that prevent it from connecting to the internet and therefore prevent it from connecting to the Find My iPhone service?
– Nonny Moose
Jan 9 at 0:07
1
It won't work on wireless, but unless I am mistaken, it should work on a Wifi and report in.
– Tom
Jan 9 at 8:49
1
@Tom Don't you have to have access to the phone to connect it to a WiFi network? At least where I'm from, widely available open WiFi services that grant internet access without user interaction are not a thing. So the phone would very likely not find anything to connect to.
– Alexander Kosubek
Jan 9 at 13:33
1
That could be true. I think you can connect to wifi from the swipe-upwards screen, but I'm not sure if it allows you to connect to a new network.
– Tom
Jan 9 at 13:44
add a comment |
The attackers are skilled enough to not enable the phone and to set up a fake Find My iPhone site. This clearly shows they understand fairly well how the iPhones security features work and are trying to trick you into revealing the credentials that will let them get around those.
Unless you are highly skilled yourself, they probably have the upper hand in this. The fact that they reach out to you like that shows they are willing to take a (small) risk to get your credentials, so your best bet is to not give them what they want. It is unlikely that you will find a trick that they didn't anticipate, and more likely that in trying you would give them information they can use.
You should get the IMEI blacklisted, if you haven't yet. This is the best effort to make the phone useless for the thieves. With any luck, they'll ditch it somewhere, someone else finds it and turns it on, and it will show up on Find My iPhone.
6
If you get the IMEI blacklisted, couldn't that prevent it from connecting to the internet and therefore prevent it from connecting to the Find My iPhone service?
– Nonny Moose
Jan 9 at 0:07
1
It won't work on wireless, but unless I am mistaken, it should work on a Wifi and report in.
– Tom
Jan 9 at 8:49
1
@Tom Don't you have to have access to the phone to connect it to a WiFi network? At least where I'm from, widely available open WiFi services that grant internet access without user interaction are not a thing. So the phone would very likely not find anything to connect to.
– Alexander Kosubek
Jan 9 at 13:33
1
That could be true. I think you can connect to wifi from the swipe-upwards screen, but I'm not sure if it allows you to connect to a new network.
– Tom
Jan 9 at 13:44
add a comment |
The attackers are skilled enough to not enable the phone and to set up a fake Find My iPhone site. This clearly shows they understand fairly well how the iPhones security features work and are trying to trick you into revealing the credentials that will let them get around those.
Unless you are highly skilled yourself, they probably have the upper hand in this. The fact that they reach out to you like that shows they are willing to take a (small) risk to get your credentials, so your best bet is to not give them what they want. It is unlikely that you will find a trick that they didn't anticipate, and more likely that in trying you would give them information they can use.
You should get the IMEI blacklisted, if you haven't yet. This is the best effort to make the phone useless for the thieves. With any luck, they'll ditch it somewhere, someone else finds it and turns it on, and it will show up on Find My iPhone.
The attackers are skilled enough to not enable the phone and to set up a fake Find My iPhone site. This clearly shows they understand fairly well how the iPhones security features work and are trying to trick you into revealing the credentials that will let them get around those.
Unless you are highly skilled yourself, they probably have the upper hand in this. The fact that they reach out to you like that shows they are willing to take a (small) risk to get your credentials, so your best bet is to not give them what they want. It is unlikely that you will find a trick that they didn't anticipate, and more likely that in trying you would give them information they can use.
You should get the IMEI blacklisted, if you haven't yet. This is the best effort to make the phone useless for the thieves. With any luck, they'll ditch it somewhere, someone else finds it and turns it on, and it will show up on Find My iPhone.
answered Jan 8 at 22:54
TomTom
5,571834
5,571834
6
If you get the IMEI blacklisted, couldn't that prevent it from connecting to the internet and therefore prevent it from connecting to the Find My iPhone service?
– Nonny Moose
Jan 9 at 0:07
1
It won't work on wireless, but unless I am mistaken, it should work on a Wifi and report in.
– Tom
Jan 9 at 8:49
1
@Tom Don't you have to have access to the phone to connect it to a WiFi network? At least where I'm from, widely available open WiFi services that grant internet access without user interaction are not a thing. So the phone would very likely not find anything to connect to.
– Alexander Kosubek
Jan 9 at 13:33
1
That could be true. I think you can connect to wifi from the swipe-upwards screen, but I'm not sure if it allows you to connect to a new network.
– Tom
Jan 9 at 13:44
add a comment |
6
If you get the IMEI blacklisted, couldn't that prevent it from connecting to the internet and therefore prevent it from connecting to the Find My iPhone service?
– Nonny Moose
Jan 9 at 0:07
1
It won't work on wireless, but unless I am mistaken, it should work on a Wifi and report in.
– Tom
Jan 9 at 8:49
1
@Tom Don't you have to have access to the phone to connect it to a WiFi network? At least where I'm from, widely available open WiFi services that grant internet access without user interaction are not a thing. So the phone would very likely not find anything to connect to.
– Alexander Kosubek
Jan 9 at 13:33
1
That could be true. I think you can connect to wifi from the swipe-upwards screen, but I'm not sure if it allows you to connect to a new network.
– Tom
Jan 9 at 13:44
6
6
If you get the IMEI blacklisted, couldn't that prevent it from connecting to the internet and therefore prevent it from connecting to the Find My iPhone service?
– Nonny Moose
Jan 9 at 0:07
If you get the IMEI blacklisted, couldn't that prevent it from connecting to the internet and therefore prevent it from connecting to the Find My iPhone service?
– Nonny Moose
Jan 9 at 0:07
1
1
It won't work on wireless, but unless I am mistaken, it should work on a Wifi and report in.
– Tom
Jan 9 at 8:49
It won't work on wireless, but unless I am mistaken, it should work on a Wifi and report in.
– Tom
Jan 9 at 8:49
1
1
@Tom Don't you have to have access to the phone to connect it to a WiFi network? At least where I'm from, widely available open WiFi services that grant internet access without user interaction are not a thing. So the phone would very likely not find anything to connect to.
– Alexander Kosubek
Jan 9 at 13:33
@Tom Don't you have to have access to the phone to connect it to a WiFi network? At least where I'm from, widely available open WiFi services that grant internet access without user interaction are not a thing. So the phone would very likely not find anything to connect to.
– Alexander Kosubek
Jan 9 at 13:33
1
1
That could be true. I think you can connect to wifi from the swipe-upwards screen, but I'm not sure if it allows you to connect to a new network.
– Tom
Jan 9 at 13:44
That could be true. I think you can connect to wifi from the swipe-upwards screen, but I'm not sure if it allows you to connect to a new network.
– Tom
Jan 9 at 13:44
add a comment |
This message is coming from an 'abundance of caution' so that you understand that you may be engaging in something that may be dangerous (organized / violent criminals). The other postings indicate that the messages are from reasonably sophisticated thieves that are fishing for your info.
Escalating ("being mean") is potentially dangerous unless you are sure you understand who 1) stole and 2) has custody of your phone. There is a non-zero chance that they know who you are, since it is your phone. The phone may have been transferred to dangerous criminals. If you know someone at GCHQ, maybe they could take it on as a pet project.
It is understandable that you would like to get your phone back and even a little karma payback: your safer bet is to work with the authorities: just make it easy for the authority to catch the thief.
add a comment |
This message is coming from an 'abundance of caution' so that you understand that you may be engaging in something that may be dangerous (organized / violent criminals). The other postings indicate that the messages are from reasonably sophisticated thieves that are fishing for your info.
Escalating ("being mean") is potentially dangerous unless you are sure you understand who 1) stole and 2) has custody of your phone. There is a non-zero chance that they know who you are, since it is your phone. The phone may have been transferred to dangerous criminals. If you know someone at GCHQ, maybe they could take it on as a pet project.
It is understandable that you would like to get your phone back and even a little karma payback: your safer bet is to work with the authorities: just make it easy for the authority to catch the thief.
add a comment |
This message is coming from an 'abundance of caution' so that you understand that you may be engaging in something that may be dangerous (organized / violent criminals). The other postings indicate that the messages are from reasonably sophisticated thieves that are fishing for your info.
Escalating ("being mean") is potentially dangerous unless you are sure you understand who 1) stole and 2) has custody of your phone. There is a non-zero chance that they know who you are, since it is your phone. The phone may have been transferred to dangerous criminals. If you know someone at GCHQ, maybe they could take it on as a pet project.
It is understandable that you would like to get your phone back and even a little karma payback: your safer bet is to work with the authorities: just make it easy for the authority to catch the thief.
This message is coming from an 'abundance of caution' so that you understand that you may be engaging in something that may be dangerous (organized / violent criminals). The other postings indicate that the messages are from reasonably sophisticated thieves that are fishing for your info.
Escalating ("being mean") is potentially dangerous unless you are sure you understand who 1) stole and 2) has custody of your phone. There is a non-zero chance that they know who you are, since it is your phone. The phone may have been transferred to dangerous criminals. If you know someone at GCHQ, maybe they could take it on as a pet project.
It is understandable that you would like to get your phone back and even a little karma payback: your safer bet is to work with the authorities: just make it easy for the authority to catch the thief.
edited Jan 9 at 16:29
answered Jan 9 at 13:58
gatorbackgatorback
5731512
5731512
add a comment |
add a comment |
Something you could do is to pretend to give them what they want. Go to their site and enter some fake credentials. They might grab those and try them on your phone or on a computer, which might reveal some information about them, like time and IP address of a failed log in attempt, maybe even location of the device.
Just be extra careful (isolated browser (in a virtual machine), plug-ins disabled, security settings to maximum, anti virus on-access scan enabled,...) when visiting their site to not fall victim to other malware they may be trying to push to you. (Not very nice, but you could use an internet cafe's computer for that. In the worst case, this computer gets infected, but since there's no personal data on it it's not a very big deal to just scrub it and put a fresh image on it; which they might do routinely anyway.)
Or use a text-only browser
– Kelly S. French
Jan 9 at 15:57
add a comment |
Something you could do is to pretend to give them what they want. Go to their site and enter some fake credentials. They might grab those and try them on your phone or on a computer, which might reveal some information about them, like time and IP address of a failed log in attempt, maybe even location of the device.
Just be extra careful (isolated browser (in a virtual machine), plug-ins disabled, security settings to maximum, anti virus on-access scan enabled,...) when visiting their site to not fall victim to other malware they may be trying to push to you. (Not very nice, but you could use an internet cafe's computer for that. In the worst case, this computer gets infected, but since there's no personal data on it it's not a very big deal to just scrub it and put a fresh image on it; which they might do routinely anyway.)
Or use a text-only browser
– Kelly S. French
Jan 9 at 15:57
add a comment |
Something you could do is to pretend to give them what they want. Go to their site and enter some fake credentials. They might grab those and try them on your phone or on a computer, which might reveal some information about them, like time and IP address of a failed log in attempt, maybe even location of the device.
Just be extra careful (isolated browser (in a virtual machine), plug-ins disabled, security settings to maximum, anti virus on-access scan enabled,...) when visiting their site to not fall victim to other malware they may be trying to push to you. (Not very nice, but you could use an internet cafe's computer for that. In the worst case, this computer gets infected, but since there's no personal data on it it's not a very big deal to just scrub it and put a fresh image on it; which they might do routinely anyway.)
Something you could do is to pretend to give them what they want. Go to their site and enter some fake credentials. They might grab those and try them on your phone or on a computer, which might reveal some information about them, like time and IP address of a failed log in attempt, maybe even location of the device.
Just be extra careful (isolated browser (in a virtual machine), plug-ins disabled, security settings to maximum, anti virus on-access scan enabled,...) when visiting their site to not fall victim to other malware they may be trying to push to you. (Not very nice, but you could use an internet cafe's computer for that. In the worst case, this computer gets infected, but since there's no personal data on it it's not a very big deal to just scrub it and put a fresh image on it; which they might do routinely anyway.)
edited Jan 10 at 11:27
answered Jan 9 at 13:16
JimmyBJimmyB
21816
21816
Or use a text-only browser
– Kelly S. French
Jan 9 at 15:57
add a comment |
Or use a text-only browser
– Kelly S. French
Jan 9 at 15:57
Or use a text-only browser
– Kelly S. French
Jan 9 at 15:57
Or use a text-only browser
– Kelly S. French
Jan 9 at 15:57
add a comment |
5
I’m curious how they would have got this number unless you’ve been the victim of a very targeted attack’s (I.e. iCloud account hacked and your phone stolen).
– Darren
Jan 9 at 7:25
1
So the thieves are sending you these spoofed messages to phish for your credentials?
– henning
Jan 9 at 13:42