
Are iPhone Farms The Next Billion Dollar Criminal Enterprise?
Image of the Messages icon.
getty
Security researchers have discovered sophisticated criminal operations using banks of iPhones called "iPhone farms" to send over 100,000 scam messages daily through Apple's encrypted iMessage system, as reported by 9to5Mac. Unlike traditional scam texts, these attacks bypass standard carrier security protections by exploiting the trusted nature of Apple's messaging platform.
An iPhone farm is a collection of physical iPhones connected to create a messaging factory. These operations use temporary, rotating Apple IDs to distribute phishing messages at scale while evading detection. Each device can send thousands of messages before switching identities, making blocking these attacks nearly impossible for mobile carriers.
The blue bubble that appears on iMessage Apple's proprietary messaging system creates an immediate sense of trust for many users. By using iMessages rather than texts, scammers can bypass spam and scam filters implemented by mobile carriers. Most people have been trained to be suspicious of strange SMS texts, but messages from fellow Apple users often bypass our psychological defenses.
The criminal masterminds behind these operations have created an entirely new business model: Phishing as a Service, or PhaaS. Fraudsters don't even need any technical skills to carry out their attacks, as there are companies offering phishing as a service. Just as legitimate companies offer Software as a Service, these criminal enterprises now provide turnkey scamming infrastructure to anyone willing to pay.
The research from security firm Catalyst reveals that these services have created a democratized criminal marketplace. A Telegram group used to sell these PhAAS attacks has more than 2,000 members. Technical barriers that once limited scamming operations have disappeared, allowing anyone with criminal intent to launch enterprise grade attacks.
One platform identified by the researchers, Lucid, is operated by threat actors from China and targets victims across 88 countries. This represents a shift from opportunistic criminal activity to organized, industrial scale operations.
One group called the XinXin group was seen putting phishing templates on sale. These are created to copy postal services, tax refunds and even road toll fee systems. This level of professionalism and scale transforms what was once small time fraud into a potential billion dollar criminal industry.
End to end encryption, a technology designed to secure communications from prying eyes, has become a double edged sword. Research experts at Catalyst say that scammers are switching to iMessage as they're encrypted. Networks cannot see the material, so they aren't ever blocked or highlighted.
When messages are sent through iMessage, they're encrypted on the sender's device and can only be decrypted by the intended recipient. This means neither Apple nor mobile carriers can see or filter the message content while in transit creating a perfect delivery mechanism for scammers.
These criminal operations have perfected their techniques through experimentation and analytics. Common scams doing the rounds at present include fake demands for unpaid road toll fees, claims that shipping fees are needed to release valuable packages from Customs and fictitious warnings about unpaid taxes.
Each message typically contains a link to a professional looking but fraudulent website designed to steal credentials or payment information. Some scammers go all the way to produce convincing looking alternatives to pages for organizations that seem so real, like a courier service.
What makes these scams effective is the creation of artificial urgency. Never click on these phishing links seen in emails. If there's any message asking for a quick acceptance or forcing you to act immediately to avoid a fee, there is high likelihood that something is wrong.
As these attacks become more sophisticated, digital self defense becomes essential. The main safeguard against phishing attacks is to never click on links sent in emails. Always use your own bookmarks, or type in a known URL.
Additional protection strategies include:
These iPhone farms represent significant investment sometimes millions of dollars in equipment and infrastructure suggesting extraordinary profit potential. It's all very scalable, and the subscription based designs enable cybercriminals to carry out large scale phishing attempts. These can harvest sensitive details like credit cards for matters like money fraud.
The economics are compelling for criminals. The subscription model for phishing services creates recurring revenue streams for criminal enterprises, paralleling legitimate SaaS business models. This financial stability allows for continuous refinement of techniques and greater operational sophistication.
Apple now faces difficult questions about how to maintain its encryption standards while combating abuse. Traditional carrier based filtering becomes ineffective when messages travel exclusively through Apple's encrypted channels.
The company may need to develop advanced on device detection systems that respect privacy while identifying suspicious message patterns. This technical challenge sits at the intersection of security, privacy and user experience.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
41 minutes ago
- Yahoo
Apple iPhone Shipment Could Decline In 2025 As Tariff, Competition Play Spoil Sport: IDC
International Data Corporation (IDC) Worldwide Quarterly Mobile Phone Tracker expects global smartphone shipments to grow 0.6% year over year to 1.24 billion in 2025. IDC cut the forecast from 2.3% growth in February due to high uncertainty, tariff volatility, and macroeconomic challenges leading to a slowdown in consumer spending. Growth will remain in the low single digits throughout the forecast period, with a five-year (2024-2029) compound annual growth rate (CAGR) of 1.4% due to increasing smartphone penetration, lengthening refresh cycles, and cannibalization from used smartphones, as per IDC. Don't Miss: Maker of the $60,000 foldable home has 3 factory buildings, 600+ houses built, and big plans to solve housing — this is your last chance to become an investor for $0.80 per share. Nancy Pelosi Invested $5 Million In An AI Company Last Year — Here's How You Can Invest In Multiple Pre-IPO AI Startups With Just $1,000. Despite the increased tensions, the U.S. and China are driving the 0.6% growth this year, according to the report. China is forecast to grow by 3% Y/Y, driven by government subsidies. In contrast, Apple Inc (NASDAQ:AAPL) is forecast to decline 1.9% in 2025 due to ongoing competition from Huawei, the overall economic slowdown, and the lack of subsidies for most of its models. However, heavy discounts during the upcoming 618 shopping festival and the anticipated iPhone 17 launch with significant hardware upgrades are expected to boost demand and limit further decline, the report stated. According to Anthony Scarsella of IDC, the U.S. Market is forecast to grow 1.9% in 2025, down from 3.3% in 2017, due to increased uncertainty and tariff-related price increases. Recent signals from the U.S. administration regarding potential tariff hikes on smartphones manufactured outside the U.S. further complicate long-term strategic planning for OEMs, according to Nabila Popal of IDC. However, India and Vietnam will likely remain the key alternatives to China for smartphone production. Still, additional tariffs of 20% to 30% on U.S.-bound smartphones could pose a serious downside risk to the current U.S. market outlook. Read Next: Hasbro, MGM, and Skechers trust this AI marketing firm — Invest before it's too late. 'Scrolling To UBI' — Deloitte's #1 fastest-growing software company allows users to earn money on their phones. You can invest today for just $0.30/share with a $1000 minimum. Image via Shutterstock Send To MSN: Send to MSN Up Next: Transform your trading with Benzinga Edge's one-of-a-kind market trade ideas and tools. Click now to access unique insights that can set you ahead in today's competitive market. Get the latest stock analysis from Benzinga? This article Apple iPhone Shipment Could Decline In 2025 As Tariff, Competition Play Spoil Sport: IDC originally appeared on Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Miami Herald
4 hours ago
- Miami Herald
Popular cloud storage service might be oversharing your data
A friend recently told me that the artificial intelligence she uses occasionally asks her: "How is your baby?". That is what happens when you share personal information with an AI. The chats become weird and perhaps scary if you actually believe AI is sentient. Even if you don't believe AI is sentient, I assume you wouldn't want it to have access to your banking data. Would you? Don't miss the move: Subscribe to TheStreet's free daily newsletter Having your data in "the cloud" has become the norm. It does not matter whether you use an iPhone with iCloud or an Android with Google Drive; your device is almost inevitably connected to a cloud service. It probably makes you feel your data is safer because even if your phone is destroyed in an accident, it is still in the cloud. The convenient sharing of files must be the "killer feature" for photography lovers. Once companies figured out they could make more money by selling their software "as a service", instead of selling it as a product you pay for just once, we got into the wonderful world where we can't avoid using so-called webapps. Good examples are Slack, Trello, ClickUp, Zoom, and, of course, ChatGPT. Yes, Slack can be installed as an application, but it is actually just a browser with one tab open and a lot of makeup. These services often offer integration with cloud storage services so you can share some of that data with them. Microsoft CEO Satya Nadella said in October 2015: "More than half a billion people manage their documents and photos in OneDrive." As the company does not release usage data, that 10-year-old quote from Computerworld is the best available estimate of the number of OneDrive users. It is probably a lot smaller than the real number. Related: Palantir gets great news from the Pentagon Because Microsoft (MSFT) doesn't give any data specific to OneDrive, we have to rely on the data for Microsoft 365 products. Here are some interesting numbers from its earnings report for Q3 of fiscal year 2025: Revenue was $70.1 billion and increased 13% year over income was $25.8 billion and increased 18% 365 commercial products and cloud services revenue increased 11% 365 Consumer products and cloud services revenue increased 10% YoY. Again, we don't have the exact numbers, just the total revenue, but the revenue from 365 services is growing steadily. Considering how much money it is making and that many businesses are using it, OneDrive must be very secure, at least that is what you'd expect. When two apps have "integrations", we can say that both of the apps "integrating" represent non-human identities working together. Oasis Security is a private company specializing in the management and security for non-human identities. Non-human identities are any software process, application, service, or machine that can interact with another. On May 28th, they published an alarming research paper on Microsoft's OneDrive. Oasis researchers discovered that whenever you upload files from your OneDrive to a web app like ChatGPT or Slack, OneDrive's file picker requests read access for the entire drive. This means that even when you upload a single file, the app gets access to all your files. More Tech Stocks: Palantir gets great news from the PentagonAnalyst has blunt words on Trump's iPhone tariff plansOpenAI teams up with legendary Apple exec This is the scenario where if you have banking documents on your OneDrive and you intend to give ChatGPT access to some unimportant text file, as a bonus, it gets access to the banking files, too, and whatever else you have there. And the best part-the permissions are valid for at least an hour. The company estimated that hundreds of apps are affected, not just the ones mentioned. According to Oasis, they reached out to Microsoft, "which took note of the report and may consider improvements in the future". If you use OneDrive, you should check which apps have access to it and revoke any suspicious apps. Oasis provided instructions on how to check your personal OneDrive accounts: Log in to your Microsoft the left or top pane, click on "Privacy".Under "App Access", select the list of apps that have access to your the list of apps, and for each app, click on "Details" to view the specific scopes and permissions can "Stop Sharing" at any time. Consider that an Access Token takes about an hour to expire regardless of when you clicked stopped sharing. This would however revoke a Refresh Token if present. Overall, when protecting your data, think deeply about giving apps access in the future. Related: Analyst resets Nvidia stock price target after CEO slams U.S. chip policy The Arena Media Brands, LLC THESTREET is a registered trademark of TheStreet, Inc.


Time Business News
4 hours ago
- Time Business News
Spyworld Hacker For Hire
Trustworthy Certified Ethical Hackers For Hire Hire WhatsApp Hack Expert Spyworld to Get Your Job Done Genuine Hackers for Hire Easiest way to Hire a WhatsApp Hacker 2025 1. Trustworthy Certified Ethical Hackers For Hire. 2025 WhatsApp Hacking Tool Hiring a Professional WhatsApp hacker for rent is hard to come by these days but with the intervention Spyworld Hacker For Hire, you can connect with proven performers in the hacking world in a matter of seconds. Have you been having lots of difficulties getting the right hacker for your hacking projects? Find the right hacker today on www. with highly skilled world-class professional hackers on standby to help you achieve success with your hacking project(s). Spyworld came up as the world's most reliable, trusted and verified hacking platform where you meet professional hackers for your hacking services. We are dedicated and working to meet your hacking demands through our hackers in the dark web. We also provide 24-hours hacking services to make sure you meet your goals without any delay. As the leading Hire a Hacker platform, we take pride in serving our customers from across the world. Our certified hackers are our strength and our customer satisfaction is our top priority. We have experts in different hacking fields and we promise to always provide quick project delivery. With a wide range of hacking solutions, we pave the way to the hacking success you desire. Contact Us ( ) We are a group of hackers from across the globe with many area of expertise, you can hire a hacker today if your Partner is Cheating, Cell Phone Access, Phone Monitoring, Email Hacking, Software Penetration, Skype hacking, data penetration, cyber bullied, if you social media accounts are hacked or let it be anything. Hire a hacker or private investigator with us for a wide range of services to name a few but not limited to like cheating spouse/partner investigation, keep a watch on your child's mobile phone by monitoring their device, get help restoring access to different social media platforms like snapchat, Facebook, Instagram etc in case you have lost your password. Spyworld Hacker For Hire is your trustworthy source for phone hacking services in the USA. here to help you out. We are committed to providing excellence in our services and meet all your hacking needs in no time. We know that there are many ways to hack cell phones and we always use the best one that suits your requirements and brings the desired results. We focus on providing reliable and affordable phone hacking solutions to make sure all our customers are satisfied. We have a team of certified and professional cell phone hackers that constantly works to help you meet your hacking goals. Given how important our smartphones are to our everyday lives, it makes sense that we want to protect ourselves while we use them. Some of the iPhone spy services in the list are a bit of fun while some have a serious use. Whatever the reason you want to use a spy service, these are some of the best around. When you initiate and use these services, you're taking responsibility into your own hands. With that out of the way, let's dive into the list! At Spyworld Hacker For Hire we are proud to help you find exactly the Hacker you're looking for safely, confidently and securely and avoid legal troubles, Professional Mobile Phone Hackers for hire we are here to solve those problems for you. If you are in New York or anywhere in the world just contact our mail and get the best Certified Hackers for Hire to get your job done cleanly and anonymously. 2. Hire WhatsApp Hack Expert Spyworld to Get Your Job Done. 2025 WHATSAPP HACK- Spyworld Spyworld hacker is one of the best certified hackers for hire. We understand your need for having a secure website, as keeping your credentials safe is your sole concern. We are the best ethical hackers for hire that you are looking for. Our team is available to hire a hacker for cell phones also. We ensure that the professional hacker for hire online you look for has a clear and practical understanding of what you actually want. People usually hire someone to hack a phone and this is why it seems necessary to look for an ethical hacker. Professional cell phone hackers are dedicated to providing satisfactory services at anonymous hack For us, providing professional website hacking services is our main objective, as cybersecurity has become a matter of concern for all. Our professional hackers are not just certified but also experienced to give you the best solutions when you need the best computer hacking services. We give you quick access to our largest pool of ethical hackers to ensure you receive desired services for the best web hacking by experts. Visit our website and hire professional hackers for email hacking to make sure you receive the best services indeed. We will introduce you to one of the best qualified Spyworld Ethical Hackers around the world. And help to change the negative perspective of GOOD Hackers for Hire 3. Genuine Hackers for Hire 101 Trusted Hire a Hacker Company | #1 Genuine Top Hackers For Hire 2025 – Spyworld Do you want to hire a professional hacker who can hack into your cell phone, computer, and even website to solve your problems? Our team of Spyworld hacker for hire is certified hackers for hire if you are on the lookout for safe and secured hacking anywhere across the globe. Our team of genuine hackers for hire is here to accept all the challenges you bring to them, which has earned us the title of the most trusted professional hacker for hire by our clients. Whether you are looking for a genuine hacker for hire into your WhatsApp account or you want to find a hacker that can enter into your cell phone, you can hire a hacker online from our team of the best hacker for hire only at Spyworld Hack, you companion to hire a hacker and get your job done in no time. Contact Us [Spyworld@ 4. Easiest way to Hire a WhatsApp Hacker 2025 Can I See My Husband's WhatsApp Chats Remotely ? Can I remotely spy on my wife's WhatsApp History Remotely? I need help with spying on my spouse's iPhone Secretly, The Simple Answer is Yes!!! WhatsApp, which is used by 1.5bn people worldwide, discovered recently the Spyworld tool can remotely install surveillance software onto both iPhones and Android phones by ringing up the targets using the app's phone call function. The WhatsApp Hacking Tool could be transmitted even if users did not answer their phones, and these calls will disappear from the Target's Call logs. Spyworld flagship product is its Remote Hacking Tool, a program that can turn on a phone's microphone and camera, Retrieve Deleted Messages, trawl through emails and messages and collect location data. Our Spyware takes over the functions of Target's Mobile Phone Operating systems. Spyworld provides full access to the target device, remotely and discreetly, WhatsApp hacker for hire service is available at reasonable prices as a standalone WhatsApp hack service as well as a part of phone hacking service which provides access to WhatsApp as well. Our prices are one of the best in the industry and you can be assured of 100% confidentiality and secrecy of both your communication with us and the WhatsApp hacking service that we provide and be assured of its intractability under any circumstances. WhatsApp hacker for hire service can be provided within 24 hours if it is urgent for you which carries a small surcharge which is included within the price. If you are willing to wait longer then you can ask for a discount which we provide for non priority WhatsApp hacking service requests. WhatsApp is a widely used service especially in the UK and as you can imagine most of our WhatsApp hacker for hire service requests come from the UK. We provide full access to WhatsApp accounts including messages, pictures and videos both sent and received and also voice and video call recordings. 5. Hacking an iPhone iPhones are expensive, but their tight security features make up for it. In general, hacking into an iPhone is more difficult than an Android phone. Only under limited circumstances can an iPhone be hacked; you must have the target's iCloud credentials. It is nearly impossible to hack into an iPhone without these credentials. This is due to Apple's usage of a centralized cloud service to provide storage and a consistent user experience across all iOS devices. In the case of an iPhone, knowing the target's phone number is as important as possessing iTunes credentials. iPhone Hacker You can use the Spyworld Hire a Hacker Service to access and download all of the target's data if they have enabled iCloud storage on their device. The nicest aspect is that you won't have to install the app on the target iPhone or jailbreak it 6. Hacking an Android Phone Spying on and hacking into Android devices differs significantly from what we described previously for iOS users. Android phones are difficult to hack since they are based on open-source application programming interfaces (APIs). Monitoring an Android user, in contrast to hacking an iOS device, requires physical access to the device. You wouldn't try to hack someone's device if having physical access to it was so simple. It's likely that multiple failed attempts will make your target suspicious of your behavior and make them warier. Once you've gained access to the device, you'll need to download and install the appropriate spyware, as well as grant it permission. You may quickly navigate with the Spyworld Hacker For Hire through its user-friendly spyware interface if you use it. The Hacker For Hire is chock full of recording features that allow you to customize how videos and images are collected, including multi-lens support and slow motion recordings. If you're looking for the best hacker for hire to spy on iOS devices, this is it. Spyworld is a very powerful iPhone spy that is entirely undetectable. It includes a keylogger, call monitor, website blocker, geofence alert to let you know if the handset enters a location you don't want it to, chat logger that works with WhatsApp, GPS tracker, internet monitor and remote control. The app also comes with 24/7 customer service. Spyworld Hacker For Hire Spy Service. This iPhone Hacker For Hire can monitor calls, keystrokes, track the phone using GPS, secretly record using the microphone and alert you when particular words are typed or mentioned. The real strength of Spyworld is that it Remotely carries out its procedure in real time so even if the user deletes chats and call logs you will still see them. Spyworld is available for non-jailbroken and jailbroken iPhones. The Spyworld iPhone Spy-Hacker For Hire is a great Hire a Hacker Spy Service that logs chats, SMS, call logs, images, videos, web history and more. You can also activate the microphone to listen to calls or conversations, use GPS, Wi-Fi or cell tracking to find the location and more. It works on both non-jailbroken and jailbroken iPhones and is completely silent so the user should never know what's going on. Spyworld Hacker For Hire is a fully featured iPhone Hire Hacker Spy Service that does everything from monitor keystrokes to record calls, track its location and more. Spyworld Hacker For Hire includes remote control options so you can remotely switch on the video camera or microphone to record what's going on at the time. You can also make changes to the phone remotely on the fly control. Spyworld iPhone Hacker For Hire Spy Service does work on non-jailbroken iPhones too A Hacker For Hire so great it was featured in USA Today, Spyworld is the best phone Hacker you can Hire for iOS devices today. Built to share all the important information with you that you could basically ever require, Spyworld gives you info on everything from contacts to messages and, of course, location tracking. Not only does Spyworld allow you to keep track of your phone in case it's misplaced, but the phone can also track your kids or other family members. It's a solid offering, even if most of it is managed within a browser and not the app itself. Spyworld Hacker For Hire is the most comprehensive iPhone Spy-Hacker For Hire out there but is also one of the most expensive. It can listen to or record live calls, record Skype calls, record SMS, chats, IMs, social media use, Facetime, record all keystrokes and even grab passwords from the phone. It is undetectable to the user and offers full control over the device and full monitoring over everything that is done on the phone. 7. Is it Possible to Hack a Phone By Just Their Number? Is it possible to hack someone's phone merely by knowing their phone number? Not only can your smartphone be hacked, it can be done very easily without your knowledge. 'At the end of the day, everything is hackable. What I am surprised about is that people sometimes forget that it's so easy to hack into these devices. The answer is a little trickier than a simple yes or no. Hacking someone's phone isn't as hard as you might have imagined, you just need to find the right way to do it. If you try doing a quick internet search, you will find countless methods that 'claim' to hack a phone and do so much more. All you have to do is simply contact iPhone Hacker For Hire: [ Frequently Asked Questions ] How can I Hire a Reliable Hacker Fast? Just contact any of the emails pasted on the site and an agent will reply to you in no time. What kind of hackers for hire are there? There are many different kinds of hackers and many different ways to describe them. Some 'Black Hat Hackers' some 'White Hat Hackers' but in the end all hackers have the ability to help you with your project. We will steer you toward the good ones and help you avoid the bad. How do I Hire a Hacker on Qualified Hackers work? Here at Spyworld Hire a Hacker Spy Service, we act as your personal matchmakers. Helping you understand the kind of hacker for hire or services that best fits your needs. Then if we cannot do it ourselves, and it doesn't violate our policies, we will connect you with the perfect hacker for hire. 101 – Other Spyworld Hacking Services. 101. Spyworld Cheating Partner Investigation 101. Email Hacking by Spyworld Hire a Hacker Spy Service 101. Spyworld Hire a Hacker For Mobile Phone Hacking 101. Spyworld Hire a Hacker For Facebook Hacking 101. How to carry out Snapchat hacking using Spyworld Hire a Hacker Service 101. Cyber bully investigation 101. Cell Phone hacking 101. Instagram hacking 101. TikTok hacking 101. Youtube channel Hacking 101. iMessages hacking 101. Software Penetration 101. Hack a website 101. How to hire a hacker, 101. hire a hacker for free, 101. hire a hacker reviews , 101. hire a hacker to catch a cheater , 101-Hire a Hacker cheap , 101. Can you help me search Spyworld hire a hacker, 101. Hire a Hacker comments , 101. Hire a Hacker for iPhone , 101. Hire a Hacker for Facebook , 101. Hire a Hacker for hacking website, 101. Hire a Hacker reddit, Contact Us: OR Spyworld47@ TIME BUSINESS NEWS