Identity Theft - A Very Personal Hacking Attack

Recently, a US woman was hacked and her personal data held to ransom. She contacted us to tell her story and has kindly agreed that we can tell it to you here. It's a grave warning about the dangers of identity theft and how vulnerable we can be when digital communications platforms are so easily exploited by online criminals.  Everyone needs to be aware of these dangers. 

This is her experience of trying to get help from social media companies and the police. 

“My Apple ID and Facebook were hacked from within an app. The hacker is from the Ukraine. He targeted me for a high profile game which, according to Apple, is the source of the breach. He changed all of my information so I can't verify my account. All of my personal information is now in their hands to include Social Security, ID's, mortgage application, bank accounts, credit cards, Google saved passwords to 87 accounts, my emails, messages, photo's." 

“I was contacted today by another person claiming to be a police officer from the Ukraine. He said he bought an iPhone on the Internet with a Lords Mobile game on it and now the game disappeared. The game disappeared because I disputed charges and they locked it. He now wants me to pay him the $1000 he paid for to get my accounts back. The phone isn't mine. The apple ID on it is mine. Both the hacker and the buyer of the phone now have access to all of my data."

“I had searched the Ukraine police and clicked a link that said it was their cyber security team but no responses. I have also contacted both Apple and Facebook multiple times but can’t get a positive response. 

“Apple can’t help me because the hacker changed everything that verifies me as me within 1 hour on July 21. In that same hour he did the same to Facebook. And Facebook doesn’t respond to my multiple attempts to send my photo ID, reports of my stolen acct, and you can’t contact a real person."

“I contacted my local police but they laughed because the hacker is in Ukraine. Nothing they can do. Also called the FBI since its identity theft and my money was accessed. They can’t really help either. "

“The hacker changed 5 things for Apple. 1. To change my password. 2. To change my recovery email. 3. To add his phone number. 4 to remove my phone number and 5. To change my Apple ID to his email. The next day he removed my iPhone and erased all in my device. Apple sees all his info, but they can’t compromise his privacy!"

" I think people should know that the company that constantly touts themselves as the most secure operating system was the easiest and fastest for the hacker to get. He entered through an app on my phone, a game and on which I have a high profile player account and he sold it for $1000 along with some one’s stolen phone."

“He contacted me on my personal and work email trying to get me to pay the $1000 he paid to the hacker in return for my accounts. Is he really the hacker? Or are there really 2 different low life trying to rob me. My phone contains everything!  This is identity theft, theft of money, theft of a $10-12k digital game, fraud, theft of data, privacy and data breach, impersonation of a police officer since his email said he is a police officer of the Ukraine." 

"Maybe you can use this information, maybe you can’t. Either way, turn off your iCloud, your Google cloud, don’t back up your smart phone anywhere but an external hard drive." 

“Don’t upload documents to your phone, keep email and chats clear, keep your contacts somewhere safe, don’t pay bills or keep apps to them on your smart phone and don’t connect your credit cards or bank info to any smart phone or digital wallet. Don’t keep identification, emailed attachments like W2’s or mortgage info on a digital device or digital storage”.  

If you have any advice or suggestions for the victim of this crime please contact Cyber Security Intelligence.

You Might Also Read: 

Identity Management Fundamentals:   

 

« Cyber Crime Is Growing Very Fast Due To Coronavirus
Remote Working Has Real Cyber Security Risks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT GRC Forum

IT GRC Forum

The IT GRC Forum is an online resource and networking platform for the Governance, Risk Management, and Compliance (GRC) community

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

Blu Venture Investors (BVI)

Blu Venture Investors (BVI)

Blu Venture Investors is a venture capital firm that supports early stage companies with a focus on technology in diverse domains including cybersecurity, IoT, defense and homeland security.

National CyberWatch Center

National CyberWatch Center

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

Cyberplc

Cyberplc

Cyberplc is a global cybersecurity consulting firm providing services to government, the public sector and enterprises.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Klarytee

Klarytee

Protect your data wherever it goes. Klarytee is a SaaS platform that builds security into sensitive content to enable granular control in AI, public cloud and SaaS.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.