{"id":13609,"date":"2026-05-14T03:00:18","date_gmt":"2026-05-14T10:00:18","guid":{"rendered":"https:\/\/www.infoblox.com\/blog\/?p=13609"},"modified":"2026-05-14T03:01:10","modified_gmt":"2026-05-14T10:01:10","slug":"lookalike-domains-expose-the-iphone-theft-economy","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/","title":{"rendered":"Lookalike Domains Expose the iPhone Theft Economy"},"content":{"rendered":"<p><strong>Authors: Ma\u00ebl Le Touz, Elena Puga<\/strong><\/p>\n<h3>Executive Summary<\/h3>\n<p>Modern smartphones are extremely secure and can be remotely locked and turned into a worthless brick if they are stolen. iPhones in particular can be remotely secured using a feature called <a href=\"https:\/\/support.apple.com\/en-gb\/108794\" target=\"_blank\">Activation Lock<\/a>, preventing all future use in case the device is stolen. Even individual components can be locked by the owner.<\/p>\n<p>And yet, iPhones are stolen &#8230; a lot. <a href=\"https:\/\/finance.yahoo.com\/news\/mother-tracks-her-sons-stolen-164517561.html?guccounter=1\" target=\"_blank\">Figures indicate over 7.35 million are stolen in the United States yearly<\/a>. So, how do the thieves monetize them?<\/p>\n<p>After a friend reached out for help, we discovered a thriving underground marketplace, organized on Telegram, focused on one thing: unlocking high-end phones\u2014mostly iPhones. By combining technical tooling and social engineering, thieves now have a way to unlock devices at scale and make phone theft profitable.<\/p>\n<p>These so-called &#8220;unlocking tools&#8221; create a market for stolen phones by allowing anyone with a pulse to try to turn a bricked &#8220;lost or stolen&#8221; device into easy money.<\/p>\n<p>Despite the fact that there are no publicly disclosed vulnerabilities for late model iPhones, threat actors use clever techniques to convince the owner to enter their passcode. SMS phishing (smishing) is one of them, and our DNS telemetry shows steadily growing and persistent activity.<\/p>\n<p>We initially assumed thieves would be interested in the phone&#8217;s data. Those devices, after all, hold potentially priceless personal and corporate information. Interestingly, we discovered the opposite. Thieves are after a quick buck, and the value of the data is secondary to the value of the hardware. It seems like their phishing domains are often detected, and some of the tools sold in these forums contain mechanisms to detect DNS blocks and automatically request delisting from Google Safe Browsing.<\/p>\n<p>This paper will detail how, by analyzing DNS clusters, we were able to pivot from an initial text to reveal a thriving marketplace enabling and ultimately driving phone theft. We will then explain how this underground economy functions and how smishing is only one tool in the toolbox they use to gain access to stolen phones.<\/p>\n<h4>From Smishing to Panels<\/h4>\n<p>When somebody loses access to their iPhone, they can set a message on the locked screen, directing the finder to contact a specific phone number to return the device. See Figure 1. Users will usually choose their spouse\u2019s or parent&#8217;s phone number. It&#8217;s this helpful feature that offers the scammers a way to reach out to the phone\u2019s owner and manipulate them into unlocking it.<\/p>\n<p><img decoding=\"async\" class=\"img-400\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure1.jpg\"><\/p>\n<p class=\"image-caption\">Figure 1. Lost iPhone displaying a contact number<\/p>\n<p>This is how one of our friends was contacted when their iPhone was stolen in Asia. Shortly afterwards, they received a text with a link to a URL hosted on applemaps-support[.]live.<\/p>\n<p>Lookalike domains targeting Apple are nothing new: we detect over 800,000 a year. But the timing of the text was suspicious, and whoever sent the message clearly had the device in their possession.<\/p>\n<p>At first glance, the page on applemaps-support[.]live closely resembles the real Apple Findmy page, but this is of course a decoy\u2014the website is not operated by Apple. The phone appeared to be moving on the spoofed map (see Figure 2) but before we could do anything else, a pop-up appeared asking for the PIN code to unlock the phone. Had our friend given their passcode, the thief would have immediately gained full control of the device.<\/p>\n<div class=\"youtube-responsive\">\n<iframe src=\"https:\/\/www.youtube.com\/embed\/WQ-eTRr9K2w?si=tx7eBRDqPsTN5QMs\" title=\"YouTube video player\" allow=\"accelerometer; autoplay;\" frameborder=\"0\"  referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<p class=\"image-caption\">Figure 2. iPhone phishing page shows stolen phone moving<\/p>\n<p>Pivoting on DNS characteristics of the domain, we quickly identified a cluster of related phishing pages, all using Apple lookalike domains.<\/p>\n<h4>Discovery of an iPhone Unlocking Marketplace<\/h4>\n<p>Not all the domains in the cluster hosted phishing content. In several cases, threat actors had inadvertently exposed their own admin login page at the root of several websites. Other pages on the same domains advertised \u201cphone unlocking tools.\u201d This made us curious: Could these unlocking services be connected to smishing attacks targeting iPhone owners who had lost their devices?<\/p>\n<p>Indeed, we soon identified dozens of Telegram groups functioning as a large underground marketplace focused on unlocking phones. Different sellers offer their services to end users looking to unlock phones. The products are sold under different names, but always offer the same features:<\/p>\n<ul class=\"list-spacing\">\n<li>An unlocking tool: a Windows binary able to automatically &#8220;jailbreak&#8221; old phones. The same tool also offers a way to extract identifying information from a plugged-in device,<\/li>\n<li>An &#8216;FMI OFF&#8217; (Find My iPhone Off) or &#8216;iCloud Webkit:&#8217; a phishing and smishing kit designed to convince legitimate owners to forfeit their iCloud\/Apple Account and screen lock passcode,<\/li>\n<li>Social engineering tools: scripts, AI voice calling software and pre-recorded sound files in different languages impersonating Apple and asking for the passcode<\/li>\n<\/ul>\n<p>The tools are typically offered on a pay-as-you-go basis, where customers will pay a small fee per unlock attempt or smishing link sent. End users will routinely ask for technical help and share videos of successful attacks (as in Figure 3)<\/p>\n<p><img decoding=\"async\" class=\"img-400\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure3.jpg\"><\/p>\n<p class=\"image-caption\">Figure 3. Buyer asking for help on how to unlock a likely stolen iPhone XR. An unlocking tool can be seen in the background.<\/p>\n<p>Figure 4 shows the relationship between vendors and patrons.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure4.jpg\"><\/p>\n<p class=\"image-caption\">Figure 4. Diagram showing the organization of the &#8216;FMI OFF&#8217; kit trade<\/p>\n<p>The sale of unlocking services is key. Those tools are often branded to a particular Telegram group. With such software, criminals can automatically unlock older phone models but also extract identifying information that will then be used to craft smishing attacks targeting the device&#8217;s owner.<\/p>\n<p>Of course, nobody in those Telegram groups discloses how they obtained the device(s) they are seeking to unlock. Some pretend they\u2019ve simply forgotten the password to an old device, but that does not explain the need for the &#8220;FMI OFF,&#8221; or the social engineering features included in the tools.<\/p>\n<h3>Technical Capabilities of Unlocking Tools<\/h3>\n<p>The unlocking tools available offer varying levels of sophistication. The more complex ones connect to a license server (presumably to prevent unauthorized reselling) under a pay-as-you-go model: unlocking a recent iPhone can cost anywhere from $5 to $50 depending on the seller. The average price is below $10.<\/p>\n<p>Under the hood, the tools are just crude graphical user interfaces (GUIs) running different command-line tools (Figure 5) based on open-source utilities designed to jailbreak iPhones and extract information.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure5.jpg\"><\/p>\n<p class=\"image-caption\">Figure 5. Unlocking app offering a very simple GUI<\/p>\n<p>While there are only a handful of functionally distinct &#8220;unlocking tools,\u201d they are distributed and resold under different names by individuals located all over the world, making it seem like there is a plethora of options. We found sellers in Bangladesh, India, Pakistan, Venezuela, Mexico, Brazil, and other countries, as shown in Figure 6 below.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure6.jpg\"><\/p>\n<p class=\"image-caption\">Figure 6. Local resellers of unlocking software<\/p>\n<p>At the time of writing, the latest phone models and iOS versions above 17.0 are not affected by any publicly disclosed vulnerabilities enabling unauthorized access. Some entrepreneurial individuals try to exploit this gap in the iPhone unlocking market by advertising <a href=\"https:\/\/www.virustotal.com\/gui\/file\/98394246dd9772aa12023a577f5662ce9fe5805db62deb16171b39c32385b100\/behavior\" target=\"_blank\">trojanized versions of tools<\/a> or demanding exorbitant fees for an elusive &#8220;zero day exploit&#8221; that doesn\u2019t really exist. If it did, such an exploit would be worth seven figures or more rather than a few hundred dollars.<\/p>\n<p>Unlocking the latest phones requires a different approach: smishing! In this case, the proffered unlocking tools can extract information including device serial number, original activation country, and linked Apple Account. This data will then be used to craft a credible smishing message and landing page. This information gathering can also be done using specific Telegram bots, conveniently operated by the same groups, as shown in Figure 7.<\/p>\n<div class=\"img-container-3-col\">\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure7a.jpg\" alt=\"Figure 7a\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure7b.jpg\" alt=\"Figure 7b\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure7c.jpg\" alt=\"Figure 7c\" \/>\n<\/div>\n<p class=\"image-caption\">Figure 7. Threat actor using a Telegram bot to find owner information about a given iPhone. The bot is able to check a stolen credentials database and identify linked devices on iCloud. Access to the bot requires payment in advance.<\/p>\n<h4>How Smishing Fits into the Supply Chain<\/h4>\n<p>Besides unlocking tools, developers have also created dozens of different smishing templates, as shown below in Figure 8, covering Apple but also other major brands like Xiaomi and Samsung. All are offered in a variety of languages.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure8.jpg\"><\/p>\n<p class=\"image-caption\">Figure 8. Image generated by a reseller showing the templates they offer<\/p>\n<p>End users\u2014those looking to unlock phones\u2014will craft the attack by personalizing their chosen template based on information harvested from the unlocking tools such as the victim\u2019s name, email, and whether the passcode has four or six digits. Users can also insert a specific location on the &#8220;lost iPhone map,&#8221; and specify a specific language. All of this is an effort to make the attack appear more credible.<\/p>\n<p>They will then prepare the smishing text, including the link to the now-personalized phishing page. Figure 9 shows examples.<\/p>\n<div class=\"img-container-3-col\">\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure9a.jpg\" alt=\"Figure 9a\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure9b.jpg\" alt=\"Figure 9b\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure9c.jpg\" alt=\"Figure 9c\" \/>\n<\/div>\n<p class=\"image-caption\">Figure 9. Examples of smishing texts<\/p>\n<p>The text is sent to the contact number displayed on the locked phone&#8217;s screen. The malicious link can be sent over WhatsApp, text or email, directly from the smishing template pages as in Figure 10.<\/p>\n<p><img decoding=\"async\" class=\"img-400\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure10.jpg\"><\/p>\n<p class=\"image-caption\">Figure 10. WhatsApp smishing message received by a victim; it\u2019s carefully crafted to look like it was sent from an official Apple account<\/p>\n<p>Once the victim enters their credentials, the information is sent back to the attacker via Telegram. The login details are then immediately used to remove all linked devices from the given Apple Account, as shown in the video (Figure 11) below. Figure 12 displays both the smishing configuration panel and how the smishing page would render when browsed.<\/p>\n<div class=\"youtube-responsive\">\n<iframe src=\"https:\/\/www.youtube.com\/embed\/ahD5HCsNcLo?si=g0OAJtk3vIIUJULr\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay;\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div>\n<p class=\"image-caption\">Figure 11. A short video by a threat actor demonstrating the customization of a phishing page.<\/p>\n<div class=\"grid-container\">\n<div class=\"grid-item\">\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure12a-v2.jpg\" alt=\"Figure 12a\">\n<\/div>\n<div class=\"grid-item\">\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure12b-v2.jpg\" alt=\"Figure 12b\">\n<\/div>\n<\/div>\n<p class=\"image-caption\">Figure 12. Threat actor generating a link to a malicious landing page (left) and showing what the target page looks like (right)<\/p>\n<h3>Scale of Operations Observed via DNS<\/h3>\n<p>After expanding our initial cluster from applemaps-support[.]live and pivoting on DNS fingerprints, we identified over 10,000 domains associated with these tools. Interestingly, the domains were registered at different times and used very different hosting infrastructure. This corroborates our assessment that multiple groups are involved, based on our observations of the marketplaces.<\/p>\n<p>One thing these domains all had in common was that they were all either lookalikes of the Apple brand or had generic customer-support-themed domain names such as viewlocation[.]app or find-your-phone[.]help. The word map below in Figure 12 illustrates the relative frequency of the most common keywords.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure13.jpg\"><\/p>\n<p class=\"image-caption\">Figure 13: Most frequent words observed in domain names associated with these campaigns<\/p>\n<p>By stepping back in time in our data, we can observe a small, but growing amount of traffic from our resolvers to verified smishing domains. The query count is comparatively low, but this is expected considering the targeted nature of the attack, along with the pay-as-you-go model used by the tool developers. However, 2025 saw traffic to these domains increase by 350% compared to the previous year, as shown in Figure 14.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure14.jpg\"><\/p>\n<p class=\"image-caption\">Figure 14. Yearly traffic volume observed for campaign-related domains<\/p>\n<h3>Detection Avoidance<\/h3>\n<p>One interesting quirk we found in some of these tools is the ability to automatically contest detection by security products.<\/p>\n<p>By querying a specific attacker-controlled endpoint hosting the list of smishing domains, and using a headless Chrome browser to attempt connection, the tools can automatically check if any domains have been blocked. If connection to a domain fails, they assume it has been blocked by Google Safe Browsing. The tools will then randomly select an excuse from a list of semi-plausible reasons (&#8220;we are a charity for homeless pets,&#8221; &#8220;my daughter\u2019s dance studio website was flagged,&#8221; \u201cthe dog ate my homework,\u201d etc.) and submit it to Google to try to have the block removed. It\u2019s difficult to assess how effective this method really is, but at the time of writing most of the smishing domains were not being blocked by Google Safe Browsing.<\/p>\n<p>Figure 15 shows the script code and list of justifications, and Figure 16 shows the output.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure15.jpg\"><\/p>\n<p class=\"image-caption\">Figure 15. List of supporting reasons the threat actor\u2019s script will choose from to contest a block on a domain<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/lookalike-domains-expose-the-iphone-theft-economy-figure16.jpg\"><\/p>\n<p class=\"image-caption\">Figure 16. Threat actor running the script and its output<\/p>\n<h4>What We Learned<\/h4>\n<p>What we initially assumed was simple smishing revealed an ecosystem perfectly designed to solve a single problem: turning stolen iPhones into valuable, sellable goods.<\/p>\n<p>Today, a locked device is almost worthless on the black market, while an unlocked, high-end model is easy to resell and can fetch hundreds of dollars. With this in mind, an underground marketplace has emerged which covers the entire digital supply chain from cracking to smishing. As is now commonly the case, the tools are designed to be simple and intuitive enough to offer a very low barrier to entry. This maximizes the potential user base and amplifies their reach.<\/p>\n<p>Interestingly, and somewhat counter-intuitively, our findings show that the data stored on the device is considered to have little value. All the tools we analyzed wipe the device by default as soon as access is attained. Just reselling the device offers the most favorable trade\u2011off between risk and profit.<\/p>\n<p>Acquiring a phone could be free (depending on how you do it). Unlocking it using one of these underground tools could cost less than a hundred U.S. dollars. Even older iPhone models can still be sold for hundreds of dollars.<\/p>\n<p>As for the tool developers, their pricing model is based on individual unlock attempts, making volume a critical driver of revenue. The low barrier to entry, affiliate resellers and Telegram channels filled with success stories are, of course, intentional.<\/p>\n<p>The growth of this ecosystem can be easily observed in DNS, reflected in the sharp increase in traffic to associated domains we have seen over the past year. As the ecosystem grows, risk increases accordingly\u2014not only in the digital realm, but in the physical world as well. Unlocking capabilities directly translate into real-world theft, turning abstract online activity into tangible personal danger. With a phone in nearly every pocket, there\u2019s no shortage of potential victims.<\/p>\n<h3>Sample List of Indicators<\/h3>\n<p>The full list of indicators is available on our <a href=\"https:\/\/github.com\/Infoblox-CTO\/phoebe-openintel\" target=\"_blank\">open Github repository.<\/a><\/p>\n<table>\n<tr>\n<td><strong>Domain<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td>findyourphone[.]help<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>apple[.]com-app[.]lt<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>applemap[.]us<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>applesupporter[.]us<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>smartthingsfind-samsung[.]com<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>navigate-to-location[.]me<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>lphone-retained-store[.]us<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>view-location[.]app<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>photos-sharing[.]in<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>find[.]my-id[.]com[.]es<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>apple[.]connect-app[.]info<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>support-lcloud[.]xyz<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>icloud-f[.]com<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>mapsfind[.]info<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>locate-it-now[.]net<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>apple-mylocation[.]info<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>applebrasil[.]info<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>icloud[.]sa[.]com<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<tr>\n<td>phone[.]xuidns[.]pw<\/td>\n<td>Phishing domain<\/td>\n<\/tr>\n<\/table>\n<style>\n.savy-seahorse-table {\nfont-size:14px;word-break: keep-all;}.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {padding-right:10px;}.code-format {\/*font-family: 'Courier New';*\/}.image-caption {    font-size: 12px;margin-top:auto;}.list-spacing li{margin-bottom:20px}.img-container, .img-container-3-col {display: flex;flex-wrap: wrap;justify-content: space-between;}.img-container img {width: 49%;margin-bottom: 10px;}.img-container-3-col img {width: 30%;margin-bottom: 10px;object-fit: contain;}@media (max-width: 767px) {.img-container, .img-container-3-col {display: block;}.img-container img, .img-container-3-col img {width: 100%;}.grid-container {    grid-template-columns: 1fr!important;  }}@media (min-width: 767px) {.img-50{width:50%;}}.grid-container {  display: grid;  grid-template-columns: repeat(2, 1fr);  gap: 40px;  max-width: 800px;  margin: 0 auto;  align-items: stretch;margin-bottom: 20px;}.grid-item {   display: flex;  flex-direction: column;  justify-content: flex-start;}.grid-item img {  max-width: 100%;  height: auto;width: auto;}\n.youtube-responsive {\n  position: relative;\n  width: 100%;\n  padding-bottom: 56.25%; \/* 16:9 aspect ratio *\/\n  height: 0;\n  overflow: hidden;\n  margin-bottom: 20px;\n}\n.youtube-responsive iframe {\n  position: absolute;\n  top: 0;\n  left: 0;\n  width: 100%;\n  height: 100%;\n}\n.img-400{\nmax-width: 400px; width: 100%;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Lookalike Domains<\/span> Expose the iPhone Theft Economy');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authors: Ma\u00ebl Le Touz, Elena Puga Executive Summary Modern smartphones are extremely secure and can be remotely locked and turned into a worthless brick if they are stolen. iPhones in particular can be remotely secured using a feature called Activation Lock, preventing all future use in case the device is stolen. Even individual components can [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":13610,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[1686,777,307,1687,631,1688,1689,1690,1691,1692],"class_list":{"0":"post-13609","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-iphone","9":"tag-smishing","10":"tag-phishing","11":"tag-theft","12":"tag-icloud","13":"tag-ios","14":"tag-jailbreak","15":"tag-spearphishing","16":"tag-mobile-security","17":"tag-stolen-phone","18":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Inside the Underground Market That Unlocks Stolen iPhones<\/title>\n<meta name=\"description\" content=\"Stolen iPhones are worthless when locked\u2014until thieves use lookalike domains and underground unlocking tools to bypass Apple\u2019s security and pwn the phone.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside the Underground Market That Unlocks Stolen iPhones\" \/>\n<meta property=\"og:description\" content=\"Stolen iPhones are worthless when locked\u2014until thieves use lookalike domains and underground unlocking tools to bypass Apple\u2019s security and pwn the phone.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-14T10:00:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-14T10:01:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iphone-phising-gang-thumbnail.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Inside the Underground Market That Unlocks Stolen iPhones\" \/>\n<meta name=\"twitter:description\" content=\"Stolen iPhones are worthless when locked\u2014until thieves use lookalike domains and underground unlocking tools to bypass Apple\u2019s security and pwn the phone.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iphone-phising-gang-thumbnail.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Lookalike Domains Expose the iPhone Theft Economy\",\"datePublished\":\"2026-05-14T10:00:18+00:00\",\"dateModified\":\"2026-05-14T10:01:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/\"},\"wordCount\":2387,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iphone-phising-gang-thumbnail.jpeg\",\"keywords\":[\"iphone\",\"Smishing\",\"Phishing\",\"theft\",\"icloud\",\"iOS\",\"jailbreak\",\"spearphishing\",\"mobile security\",\"stolen phone\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/\",\"name\":\"Inside the Underground Market That Unlocks Stolen iPhones\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iphone-phising-gang-thumbnail.jpeg\",\"datePublished\":\"2026-05-14T10:00:18+00:00\",\"dateModified\":\"2026-05-14T10:01:10+00:00\",\"description\":\"Stolen iPhones are worthless when locked\u2014until thieves use lookalike domains and underground unlocking tools to bypass Apple\u2019s security and pwn the phone.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iphone-phising-gang-thumbnail.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/iphone-phising-gang-thumbnail.jpeg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/lookalike-domains-expose-the-iphone-theft-economy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lookalike Domains Expose the iPhone Theft Economy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Inside the Underground Market That Unlocks Stolen iPhones","description":"Stolen iPhones are worthless when locked\u2014until thieves use lookalike domains and underground unlocking tools to bypass Apple\u2019s security and pwn the phone.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/","og_locale":"en_US","og_type":"article","og_title":"Inside the Underground Market That Unlocks Stolen iPhones","og_description":"Stolen iPhones are worthless when locked\u2014until thieves use lookalike domains and underground unlocking tools to bypass Apple\u2019s security and pwn the phone.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/","og_site_name":"Infoblox Blog","article_published_time":"2026-05-14T10:00:18+00:00","article_modified_time":"2026-05-14T10:01:10+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iphone-phising-gang-thumbnail.jpeg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Inside the Underground Market That Unlocks Stolen iPhones","twitter_description":"Stolen iPhones are worthless when locked\u2014until thieves use lookalike domains and underground unlocking tools to bypass Apple\u2019s security and pwn the phone.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iphone-phising-gang-thumbnail.jpeg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Lookalike Domains Expose the iPhone Theft Economy","datePublished":"2026-05-14T10:00:18+00:00","dateModified":"2026-05-14T10:01:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/"},"wordCount":2387,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iphone-phising-gang-thumbnail.jpeg","keywords":["iphone","Smishing","Phishing","theft","icloud","iOS","jailbreak","spearphishing","mobile security","stolen phone"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/","name":"Inside the Underground Market That Unlocks Stolen iPhones","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iphone-phising-gang-thumbnail.jpeg","datePublished":"2026-05-14T10:00:18+00:00","dateModified":"2026-05-14T10:01:10+00:00","description":"Stolen iPhones are worthless when locked\u2014until thieves use lookalike domains and underground unlocking tools to bypass Apple\u2019s security and pwn the phone.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iphone-phising-gang-thumbnail.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/iphone-phising-gang-thumbnail.jpeg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/lookalike-domains-expose-the-iphone-theft-economy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Lookalike Domains Expose the iPhone Theft Economy"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=13609"}],"version-history":[{"count":18,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13609\/revisions"}],"predecessor-version":[{"id":13657,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/13609\/revisions\/13657"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/13610"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=13609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=13609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=13609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}