Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Security Cellphones Iphone

Thieves Busted After Stealing a Cellphone from a Security Expert's Wife (elpais.com) 41

They stole a woman's phone in Barcelona. Unfortunately, her husband was security consultant/penetration tester Martin Vigo, reports Spain's newspaper El Pais.

"His weeks-long investigation coincided with a massive two-year police operation between 2022 and 2024 in six countries where 17 people were arrested: Spain, Argentina, Colombia, Chile, Ecuador, and Peru...." In Vigo's case, the phone was locked and the "Find my iPhone" feature was activated... Once stolen, the phones are likely wrapped in aluminum foil to prevent the GPS from tracking their movements. "Then they go to a safe house where they are gathered together and shipped on pallets outside of Spain, to Morocco or China." This international step is vital to prevent the phone from being blocked if the thieves try to use it again. Carriers in several European countries share lists of the IMEIs (unique numbers for each device) of stolen devices so they can't be used. But Morocco, for example, doesn't share these lists. There, the phone can be reconnected...

With hundreds or thousands of stored phones, another path begins: "They try to get the PIN," says Vigo. Why the PIN? Because with the PIN, you can change the Apple password and access the device's content. The gang had created a system to send thousands of text messages like the one Vigo received. To know who to target with the bait message, the police say, "the organization performed social profiling of the victims, since, in many cases, in addition to the phone, they also had the victim's personal belongings, such as their ID." This is how they obtained the phone numbers to send the malicious SMS...

Each victim received a unique link, and the server knew which victim clicked it... With the first click, the attackers would redirect the user to a website they believed was credible, such as Apple's real iCloud site... [T]he next day you receive another text message, and you click on it, more confidently. However, that link no longer redirects you to the real Apple website, but to a flawless copy created by the criminals: that's where they ask for your PIN, and without thinking, full of hope, you enter it... "The PIN is more powerful than your fingerprint or face. With it, you can delete the victim's biometric information and add your own to access banking apps that are validated this way," says Vigo. Apple Wallet asks you to re-authenticate, and then everything is accessible...

In the press release on the case, the police explained that the gang allegedly used a total of 5,300 fake websites and illegally unlocked around 1.3 million high-end devices, about 30,000 of them in Spain.

Vigo tells El Pais that if the PIN doesn't unlock the device, the criminal gang then sends it to China to be "dismantled and then sent back to Europe for resale. The devices are increasingly valuable because they have more advanced chips, better cameras, and more expensive materials."

To render the phone untraceable in China, "they change certain components and the IMEI. It requires a certain level of sophistication: opening the phone, changing the chip..."

Thieves Busted After Stealing a Cellphone from a Security Expert's Wife

Comments Filter:
  • Ambiguous wording... (Score:5, Interesting)

    by Cochonou ( 576531 ) on Sunday September 14, 2025 @04:36AM (#65658626) Homepage
    The article is very interesting, as it unveils how these criminal rings are working...
    However the article does not make it clear at all that the arrestations were actually the result of the security researcher actions.
    • by Samare ( 2779329 )

      It doesn't look like he actually did anything.

      Vigo tried to find out who was behind [the PIN-stealing system], but he only got as far as a woman he believed to be Ukrainian, and he didn’t know if she was another victim or part of the gang.

      • Re: (Score:1, Troll)

        by znrt ( 2424692 )

        if it's good enough for a fluff article in the "technology" section of msm, it's good enough for /. in 2025.

        • Vigo aside, I thought all the steps involved in reconditioning the stolen phones were quite elaborate. Interesting that it requires site spoofing which means they haven't developed a technical means to defeat the phone's security measures.
          • by znrt ( 2424692 )

            social engineering is way cheaper than state of the art cybersecurity, these guys can make good money with the low hanging fruit but don't have the huge amount of money and insider information that intelligence services have. given enough of that all phones can be hacked, and are actually being hacked.

    • by Charlotte Web ( 1608165 ) on Sunday September 14, 2025 @11:00AM (#65658956) Homepage
      Vigo says on Twitter that he did in fact track down the thieves of his wife's phone [x.com].

      That tweet also links to a podcast episode where he discusses it in more detail - but it's in Spanish.
  • by registrations_suck ( 1075251 ) on Sunday September 14, 2025 @05:01AM (#65658650)

    It seems like an awful lot of work to make a used, stolen phone usable. I understand it is more if they actually get some' spin.

    In any event, these are some hardworking thieves. Imagine if they could be bothered to put their intellect and work ethic into more legal activities! They could really do some nice work.

    • Must consider the international arbitrage situation similar to gold class workers who buy and fix up totaled, old luxury vehicles. Some people elsewhere have the time and determination to avoid paying $1000 USD for a phone where that might be a year's or a month's income because they have no legal or moral alternative to acquiring a smartphone. People who are starving will work for Thai scammer boiler rooms to feed their families at the expense of scamming old Americans.
    • by Monoman ( 8745 )

      Some folks would rather work harder at not having to work than to just get a regular job. For some it seems to be the thrill of doing nefarious things. For others I guess they make their own hours and just get by.

      • Some folks would rather work harder at not having to work than to just get a regular job. For some it seems to be the thrill of doing nefarious things. For others I guess they make their own hours and just get by.

        It does seem like a royal pain in the backside to go to all that trouble. I guess it is modeled after the thieves who break into people's houses and steal the copper wires and pipe.

        • by tlhIngan ( 30335 )

          It does seem like a royal pain in the backside to go to all that trouble. I guess it is modeled after the thieves who break into people's houses and steal the copper wires and pipe.

          Except going through so many intermediaries has the same problem as it does in legitimate life - everyone wants their cut. Stolen phones have to get sent to China which costs money, the people doing the programming and disassembly want their cut and in the end the margins get thinner and thinner.

          If you think the App Store fees a

          • by BranMan ( 29917 )

            I sport an iPhone 12 Mini - if these thieves steal my phone I may just get it back. They'll just probably toss it in a dumpster.

      • Crime can be a good way to make a lot of money very quickly, so if you lack a conscious or working moral compass why wouldn't you put your time into the most profitable available enterprise?
    • by gtall ( 79522 )

      For one phone, yes, 'tis a lot of work. For 30,000+ in Spain and many more elsewhere, it pays.

  • Where's the story (Score:5, Informative)

    by SemperOSS ( 3963705 ) on Sunday September 14, 2025 @07:24AM (#65658730)

    Thieves Busted After Stealing a Cellphone from a Security Expert's Wife

    and

    His weeks-long investigation coincided with a massive two-year police operation between 2022 and 2024 in six countries where 17 people were arrested: Spain, Argentina, Colombia, Chile, Ecuador, and Peru...

    There is apparently nothing about what Martin Vigo did that had an impact on the police investigation or anything about what the police investigation comprised. His investigation and the police bust were totally coincidental (as stated in the submission), whereas the headline implies a causation. There is really no good reason to involve the police investigation in this at all, although that is not the Slashdot editor's fault.

    The article should rightfully have a headline along the lines of "Security expert investigates how stolen phones are prepared for resale" instead.

    • Heh. Headline is true in the same way as "Woman gets pregnant after eating at Arby's."

      • by Entrope ( 68843 )

        Post hoc ergo propter hoc. It's what's for breakfast, kids.

        Once upon a time, journalists learned not to fall for that kind of fallacy, and took pride in not perpetrating it. Now, it's an indispensable part of writing clickbait.

      • by PPH ( 736903 )

        Damn! If I would have known she was that easy, I wouldn't have taken her out to Canlis.

  • by Mirnotoriety ( 10462951 ) on Sunday September 14, 2025 @08:12AM (#65658792)
    “Here you can read how to report your device as lost / stolen on IMEI.info BLACKLIST [imei.info].”
    • by mjwx ( 966435 )

      “Here you can read how to report your device as lost / stolen on IMEI.info BLACKLIST [imei.info].”

      Because someone who steals a phone will never lower themselves to selling something they know doesn't work.

      Plus this little nugget:

      As a result, your device wonâ(TM)t operate in the country in which it was registered

      That means they can just send the stolen phones overseas... That's where most of the UK's stolen cars go, no point in chopping them up here when someone in Bulgaria will buy them whole no questions asked. Phones are a lot easier to move. Maybe this might stretch between the US and Canada or UK and EU but as mentioned, phones are easy to move and crims have no compunction sel

  • I suspect 1234, 0000, or 1111 unlocks about 75% of the stolen phones.
  • by Ritz_Just_Ritz ( 883997 ) on Sunday September 14, 2025 @10:01AM (#65658898)

    If the thieves don't have industrial scale partners to "launder" the phones, they become worthless.

    It's very difficult to do anything at that scale in China without the government being complicit. That trail shouldn't be particularly hard to follow, but nobody seems willing to confront the obvious corruption problem and government complicity in the criminal behavior.

  • ... than a PIN: Don't store important data on a toy.

  • by ctilsie242 ( 4841247 ) on Sunday September 14, 2025 @02:18PM (#65659182)

    What would be interesting is the ability to consider adding more functions to combat this. For example, the option where if a phone is not used in "x" amount of time, it auto-erases itself, and won't allow unlocking until it gets a GPS signal with time and date. Maybe even add geoblocking, where if the phone is turned on and notices it is in Lower Elbonia, it erases itself. Of course, GPS can be spoofed, but this is a way to further add another roadblock.

    The ultimate would be e-Fuses. Get to a level of certainty that a device is definitely stolen, start popping those to ensure that critical components cannot and will not be able to be used again. It also wouldn't hurt to have e-fuses on the SSD controller to guarentee that there will be no way to ever pull the encryption key out, combined with voltage doing a TRIM on the SSD, ensuring all data has been overwritten.

    • by jermz ( 6352 )

      I was thinking along similar lines. Apple needs to implement "remote brick" that pops internal fuses and wipes the storage. Make it a valueless slab of silicon and metal.

      • Maybe take it up one more step... have it intermittently working? Good enough to part out and sell... but then have it fail shortly after it winds up in other hardware. This way, whomever resold the components is on the hook for selling faulty hardware. For the SSD, just have it quietly go into read-only mode, where the user can get their data, but the effective usefulness of the hardware is zero.

  • Can you call a person a security expert who fails to secure their devices from theives?

Please go away.

Working...