Drive by exploit email

Last night I received an email saying that they had infected my device with a private malware from visiting a website that they had infected. They go on to say they have downloaded all my private and said if I don’t believe them they then give me an old password of mine.


they then go onto say they have recorded me through my iPhone camera and will share this and my information to all my contacts and on social media if I do not pay them £1800 in bitcoin.


im very concerned that my iPhone has been hacked and they have my personal data. I have done all emergency resets changed all of my passwords and reset my iPhone.


is this a scam or is it possible for them to have done this?

iPhone 12, iOS 16

Posted on Sep 8, 2023 01:13 AM

Reply
Question marked as Top-ranking reply

Posted on Sep 8, 2023 01:24 AM

  1. Don't share Apple IDs
  2. Don't Jailbreak
  3. Don't share sensitive information pertaining to your device
  4. Don't give in to Phishing
  5. Don't plug in your device in Airports and Public places through third-party cables and trust the device. Beware of Juice Jacking. (Especially in India)
  6. Don't leave your iPhone unlocked and unattended in public places like offices, schools, malls, etc.


If one of the above is true then quickly change the Apple ID Password and Return iPhone settings to their defaults.



Keep the iPhone updated to the latest iOS always and never Jailbreak. That's it.


iOS / iPadOS devices cannot be infected with Viruses / Malware / Spyware unless you have intentionally downloaded spurious software or unauthorized apps directly from the internet and installed them on your device or/and have Jailbroken



Similar questions

3 replies
Question marked as Top-ranking reply

Sep 8, 2023 01:24 AM in response to freya295

  1. Don't share Apple IDs
  2. Don't Jailbreak
  3. Don't share sensitive information pertaining to your device
  4. Don't give in to Phishing
  5. Don't plug in your device in Airports and Public places through third-party cables and trust the device. Beware of Juice Jacking. (Especially in India)
  6. Don't leave your iPhone unlocked and unattended in public places like offices, schools, malls, etc.


If one of the above is true then quickly change the Apple ID Password and Return iPhone settings to their defaults.



Keep the iPhone updated to the latest iOS always and never Jailbreak. That's it.


iOS / iPadOS devices cannot be infected with Viruses / Malware / Spyware unless you have intentionally downloaded spurious software or unauthorized apps directly from the internet and installed them on your device or/and have Jailbroken



Sep 8, 2023 01:25 AM in response to freya295

It is spam. Ignore it.


iOS / iPadOS devices cannot be infected** with Viruses / Malware / Spyware unless you have intentionally downloaded spurious software or unauthorized apps directly from the internet and installed them on your device or/and have Jailbroken



**The primary reason for this is Sandboxing. All third-party apps are “sandboxed”, so they are restricted from accessing files stored by other apps or from making changes to the device. Sandboxing is designed to prevent apps from gathering or modifying information stored by other apps.


Security of runtime process in iOS and iPadOS - Apple Support



The sandbox on an iPhone is a security feature that creates a restricted environment for each app to run in isolation from other apps and the operating system. It is a core component of iOS's security architecture and plays a crucial role in making iPhones more secure.


In layman's terms:


The sandbox works by enforcing strict controls and limitations on app behavior, ensuring that each app has access only to the resources it needs to function properly. Here are some key aspects of the sandbox that contribute to iPhone security:


  1. Isolation: Each app on an iPhone operates within its own sandboxed environment, which means it has no direct access to the files, processes, or memory of other apps. This isolation prevents apps from interfering with one another, protecting user data and maintaining system stability.
  2. Restricted Resource Access: The sandbox restricts an app's access to sensitive resources such as contacts, photos, location data, and system settings. Apps must explicitly request user permission to access these resources, and users have control over granting or denying access. This helps prevent unauthorized data access and ensures user privacy.
  3. Limited File System Access: Apps can only access their own containerized storage area and specific system-provided directories. They cannot modify files outside of their designated areas or interfere with the operating system files. This prevents apps from tampering with critical system components.
  4. Code Execution Controls: The sandbox enforces restrictions on code execution, preventing apps from running arbitrary code or injecting malicious code into other apps or the system. It helps ensure that apps only execute approved code from their own sandboxed environment.
  5. App Review Process: Before an app is allowed on the App Store, it goes through a rigorous review process conducted by Apple. This review examines the app's functionality, security, and adherence to guidelines. It helps detect and remove malicious or poorly designed apps, minimizing the risk to users.


The combination of these sandboxing mechanisms helps create a secure environment on iPhones, protecting user data, maintaining system integrity, and preventing unauthorized access or interference between apps.



This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Drive by exploit email

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.