Identity Theft - A Very Personal Hacking Attack

Recently, a US woman was hacked and her personal data held to ransom. She contacted us to tell her story and has kindly agreed that we can tell it to you here. It's a grave warning about the dangers of identity theft and how vulnerable we can be when digital communications platforms are so easily exploited by online criminals.  Everyone needs to be aware of these dangers. 

This is her experience of trying to get help from social media companies and the police. 

“My Apple ID and Facebook were hacked from within an app. The hacker is from the Ukraine. He targeted me for a high profile game which, according to Apple, is the source of the breach. He changed all of my information so I can't verify my account. All of my personal information is now in their hands to include Social Security, ID's, mortgage application, bank accounts, credit cards, Google saved passwords to 87 accounts, my emails, messages, photo's." 

“I was contacted today by another person claiming to be a police officer from the Ukraine. He said he bought an iPhone on the Internet with a Lords Mobile game on it and now the game disappeared. The game disappeared because I disputed charges and they locked it. He now wants me to pay him the $1000 he paid for to get my accounts back. The phone isn't mine. The apple ID on it is mine. Both the hacker and the buyer of the phone now have access to all of my data."

“I had searched the Ukraine police and clicked a link that said it was their cyber security team but no responses. I have also contacted both Apple and Facebook multiple times but can’t get a positive response. 

“Apple can’t help me because the hacker changed everything that verifies me as me within 1 hour on July 21. In that same hour he did the same to Facebook. And Facebook doesn’t respond to my multiple attempts to send my photo ID, reports of my stolen acct, and you can’t contact a real person."

“I contacted my local police but they laughed because the hacker is in Ukraine. Nothing they can do. Also called the FBI since its identity theft and my money was accessed. They can’t really help either. "

“The hacker changed 5 things for Apple. 1. To change my password. 2. To change my recovery email. 3. To add his phone number. 4 to remove my phone number and 5. To change my Apple ID to his email. The next day he removed my iPhone and erased all in my device. Apple sees all his info, but they can’t compromise his privacy!"

" I think people should know that the company that constantly touts themselves as the most secure operating system was the easiest and fastest for the hacker to get. He entered through an app on my phone, a game and on which I have a high profile player account and he sold it for $1000 along with some one’s stolen phone."

“He contacted me on my personal and work email trying to get me to pay the $1000 he paid to the hacker in return for my accounts. Is he really the hacker? Or are there really 2 different low life trying to rob me. My phone contains everything!  This is identity theft, theft of money, theft of a $10-12k digital game, fraud, theft of data, privacy and data breach, impersonation of a police officer since his email said he is a police officer of the Ukraine." 

"Maybe you can use this information, maybe you can’t. Either way, turn off your iCloud, your Google cloud, don’t back up your smart phone anywhere but an external hard drive." 

“Don’t upload documents to your phone, keep email and chats clear, keep your contacts somewhere safe, don’t pay bills or keep apps to them on your smart phone and don’t connect your credit cards or bank info to any smart phone or digital wallet. Don’t keep identification, emailed attachments like W2’s or mortgage info on a digital device or digital storage”.  

If you have any advice or suggestions for the victim of this crime please contact Cyber Security Intelligence.

You Might Also Read: 

Identity Management Fundamentals:   

 

« Cyber Crime Is Growing Very Fast Due To Coronavirus
Remote Working Has Real Cyber Security Risks »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Achtwerk

Achtwerk

Achtwerk manufacture the security appliance IRMA for critical infrastructures and networked automation in production plants.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

Vigilant Software

Vigilant Software

Vigilant Software develops industry-leading tools for intelligent, simplified compliance, including ISO27001-risk management and EU GDPR.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Netlinkz

Netlinkz

Netlinkz has developed the Virtual Secure Network (VSN) overlay technology platform, a breakthrough in connectivity security, speed, and simplicity.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

Nonprofit Cyber

Nonprofit Cyber

Nonprofit Cyber is a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.

Eurotech

Eurotech

Eurotech provides Edge Computers and IoT solutions. We help to connect your assets and make them smarter through secure and agnostic hardware and software technologies.

OneZero Solutions

OneZero Solutions

OneZero specialize in cybersecurity operations, information assurance, computer network operations, solutions engineering, and project management.

Ionize

Ionize

Ionize offers solutions to help you uplift your capability across the full-spectrum of cyber security - assessment, remediation, monitoring, governance and ongoing education.

CertX

CertX

CertX is a Swiss functional safety, cybersecurity and artificial intelligence certification body.

Qwiet AI

Qwiet AI

At Qwiet AI we enable you to prevent cyberattacks by securing code from the start. Secure code in three steps.