Hackers are asking ransom from Apple not to delete iPhones

Apple is reportedly under to pay a ransom to a group of hackers who threaten to remotely wipe iPhones.

The hackers are called "Turkish Crime Family." Given how big Apple is, hackers are demanding little money from the company, since the amount is $ 75.000 in Bitcoin. Alternatively, the company could donate $ 100.000 to gift cards from iTunes, according to a Motherboard publication.apple

The fact that hackers have reported the threat to the media suggests they probably want to make Apple worry more, while at the same time informing users that the company can do nothing but pay.

Hackers also made some available from supposed email between the team and members of Apple's security team. They also posted a video on YouTube showing them being able to log into stolen accounts, view photos, and remotely wipe devices.

One of Apple's alleged emails to hackers asks them to download the video, citing:

"We would like you to know that we do not reward cyber criminals for violating the law."

On the other hand, the Motherboard reports that the data on hack shows some inconsistency. In one of the emails, the hacker claims to have access to 300's million e-mail accounts of Apple, while in another the number reaches 559 million.

For its part, Apple seems to be keeping its cool. However, the hackers have given them until April 7 to pay the ransom. It will start iPhones via iCloud? Is it true or not? Be patient and we'll see.

The pressure that hackers allegedly hurt at Apple through the media seems to indicate that the negotiations are not going well.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).