Hackers are asking ransom from Apple not to delete iPhones

Apple is reportedly under pressure to pay a ransom to a group of hackers who threaten to delete long iPhones.

Hackers are called “.” Considering how big Apple is, the hackers are asking for a small amount of money from the company, since the amount is as high as $75.000 in Bitcoin. Alternatively, the company could give away $100.000 in iTunes gift cards, Motherboard reported.apple

The fact that the hackers publicized the threat to the media suggests that they probably want to make Apple more worried, while at the same time informing that the company can do nothing but pay.

The hackers also made available some screenshots of alleged email between the team and members of Apple's security team. They also posted a video on YouTube showing them being able to log into stolen accounts, view photos, and remotely wipe devices.

One of Apple's alleged emails to hackers asks them to download the video, citing:

"We would like you to know that we do not reward cyber criminals for violating the law."

On the other hand, Motherboard reports that the data it has about the hack shows some inconsistency. In one of the e-mails, the hacker claims to have access to 300 Apple email accounts, while another puts the number at 559 million.

For her part, Apple seems to keep her temper. But hackers have given them time until April 7 to pay for the ransom. Will I delete iPhones via iCloud? Is it true or not? Patience and we will see.

The pressure that hackers allegedly hurt at Apple through the media seems to indicate that the negotiations are not going well.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).