{"id":46904,"date":"2022-05-31T16:27:42","date_gmt":"2022-05-31T16:27:42","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33508\/The-Underground-Company-That-Hacks-iPhones-For-Ordinary-Consumers.html"},"modified":"2022-05-31T16:27:42","modified_gmt":"2022-05-31T16:27:42","slug":"the-underground-company-that-hacks-iphones-for-ordinary-consumers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/","title":{"rendered":"The Underground Company That Hacks iPhones For Ordinary Consumers"},"content":{"rendered":"<div readability=\"36.367521367521\">\n<div class=\"topic-callout\" readability=\"7.2888888888889\">\n<div class=\"topic-callout__img\"><a href=\"https:\/\/www.vice.com\/en\/topic\/cyber\"><img decoding=\"async\" src=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" alt=\"Screen Shot 2021-02-24 at 3\"><\/a><\/div>\n<p>Hacking. Disinformation. Surveillance. CYBER is Motherboard&#8217;s podcast and reporting on the dark underbelly of the internet.<\/p>\n<\/div>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>\u201cActivation Lock,\u201d a message displayed across the iPhone\u2019s screen read. \u201cThis iPhone is linked to an Apple ID. Enter the Apple ID and password that were used to set up this iPhone.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>This lock essentially turns iPhones into very expensive paperweights until the owner enters the requested credentials. The feature is designed to stop anyone else from using the phone if it&#8217;s lost, or thieves from making money by reselling a stolen device. In part, Activation Lock is intended to make iPhones less attractive to thieves because stolen devices can\u2019t be used.<\/p>\n<p><\/span><\/div>\n<div readability=\"37.687198067633\"><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>Now, an underground group is offering people a way to strip that lock from certain iPhones with its pay-for-hacking service. iOS security experts suspect it is being used to remove protections from stolen iPhones. The hacking group called Checkm8.info offering the service, which lifts its name from a popular free-to-use jailbreak, insists its tool cannot be used by thieves.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33.630484988453\"><\/p>\n<p>\u201cOur goal is the ability to repair electronics as it&#8217;s the key to saving resources, tackling e-waste and environmental damage,\u201d the administrator of Checkm8.info told Motherboard in an email. Motherboard has <a href=\"https:\/\/www.vice.com\/en\/article\/8xyq8v\/how-to-unlock-icloud-stolen-iphone\">previously written about<\/a> how criminals have used phishing emails to grab necessary login credentials to remove the Activation Lock. Checkm8.info provides a much easier method, and appears to streamline what is ordinarily a complicated process into one that non-technical users can follow. Checkm8.info is correct in that Activation Lock can be frustrating to iPhone repair professionals, electronic waste facilities, and refurbishers, and has <a href=\"https:\/\/www.vice.com\/en\/article\/43jywd\/why-tens-of-thousands-of-perfectly-good-donated-iphones-are-shredded-every-year\">caused many perfectly good phones<\/a> obtained through legal means to be shredded or destroyed. A user of the Checkm8.info site told Motherboard they used the service as part of their legal phone reselling business.<\/p>\n<p><\/span><\/div>\n<div readability=\"41.795918367347\">\n<blockquote data-component=\"QuoteBlock\" class=\"abc__quote abc__quote--blockquote\" readability=\"9.5733788395904\">\n<p><em><strong>Do you have more information on criminals using Activation Lock bypass tools? We&#8217;d love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, OTR chat on&nbsp;<a href=\"mailto:jfcox@jabber.ccc.de\">jfcox@jabber.ccc.de<\/a>, or email&nbsp;<a href=\"mailto:joseph.cox@vice.com\">joseph.cox@vice.com<\/a>.<\/strong><\/em><\/p>\n<\/blockquote>\n<p><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27.159763313609\"><\/p>\n<p>Under the hood, Checkm8.info is using <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/11\/what-the-newly-released-checkra1n-jailbreak-means-for-for-idevice-security\/\" target=\"_blank\" rel=\"noopener\">checkra1n<\/a>, a jailbreaking tool released in 2019. Checkra1n uses an exploit called <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/09\/developer-of-checkm8-explains-why-idevice-jailbreak-exploit-is-a-game-changer\/\" target=\"_blank\" rel=\"noopener\">checkm8<\/a> written by the developer known as Axi0mX.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>\u201cI don\u2019t like it, but I don\u2019t know what I can do about it,\u201d Axi0mX said in an online chat about the checkm8.info service. \u201cEither way I don\u2019t support the practice and neither does the checkra1n jailbreak and checkra1n team.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"34\"><\/p>\n<p>Checkm8.info only works for devices running iOS versions 12 to 14.8.1, according to checkm8.info\u2019s website. That\u2019s because checkm8 only works on older iPhones devices, up to the iPhone X, as it exploits an older version of the iPhone\u2019s bootrom, the first code that an iPhone runs when it turns on. Newer iPhones have updated bootrom code that is not vulnerable to checkm8.<\/p>\n<p><\/span><\/div>\n<div readability=\"51.014211886305\"><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30.993902439024\"><\/p>\n<p>Activation Lock is enabled on an Apple device <a href=\"https:\/\/support.apple.com\/en-us\/HT201365\" target=\"_blank\" rel=\"noopener\">when the user sets up Find My<\/a>, the Apple service that lets people track the location of their iPhone, Mac, or Apple Watch. After that, anyone who wants to erase or reactivate the device\u2014something that would be vital for resellers\u2014needs to enter the relevant Apple ID password.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>A video on checkm8.info\u2019s website shows how simple the process of using the checkm8.info tool is. A user downloads the software, installs it, opens it up, then plugs in their target device to their Mac or PC.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>\u201cGet ready for the jailbreak!\u201d the video\u2019s female narrator says at one point. The video then shows the checkra1n jailbreak running on a device.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"37\"><\/p>\n<p>Ordinarily, if a user was running the checkra1n jailbreak themselves, that would be the end of the process. But checkm8,info, in its mission to co-opt a free piece of software and turn a profit, then asks users to buy a license to complete the hack. The site charges $69.99 per license, according to the video. In Motherboard\u2019s own tests, the price has been reduced and the organization now asks for a payment of $49.99.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>\u201cDone! You have successfully bypassed iCloud activation lock on your device,\u201d the narrator adds.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>The administrator told Motherboard in an email that they sell 30 to 150 licenses per month, which works out to $2,100 to $10,500.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"25.817307692308\"><\/p>\n<p>Checkm8.info has a couple of apparent competitors that offer similar services too, <a href=\"https:\/\/minacriss.org\/\" target=\"_blank\" rel=\"noopener\">such as Minacriss<\/a> and <a href=\"https:\/\/iremovalpro.com\/\" target=\"_blank\" rel=\"noopener\">iRemoval PRO<\/a>. A post in the Telegram channel of iRemoval PRO mentions use of the checkm8 exploit too.&nbsp;<\/p>\n<p><\/span><\/div>\n<div readability=\"42\"><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>Checkm8.info&nbsp;also offers a service that it describes as &#8220;Bypass iPhone Passcode.&#8221; However this service is not a tool similar to established iPhone unlocking services such as Cellebrite and GrayShift, though. \u201cThis service restores the device to factory settings and activates it as a new device using a saved activation ticket from the system.&nbsp; So basically this method has nothing with brute forcing or user data leak. Passcode phrase is a common name used by other tools for this service so we decided to give it the same name,\u201d the&nbsp;checkm8.info&nbsp;administrator told Motherboard.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>Checkm8.info also offers a reseller program where vendors can sign up to buy checkm8.info licenses in bulk, perhaps for their own at scale unlocking service.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>Kevin Flash runs a company called SellLocked which buys iPhones that have Activation Lock. For example, SellLocked.com offers $25 for a good condition iPhone X with Activation Lock, according to a quote generated by the site. Flash told Motherboard in a Facebook message he uses checkm8.info to remove the lock and then resells the now working phone. He said once a phone has Activation Lock enabled and a person can\u2019t remove it for whatever reason, \u201cso many Apple products become literal garbage other than a few key parts.\u201d&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>\u201cThe waste is just astronomical,\u201d he added. In one Facebook post, Flash said he had used checkm8.info on 30 iPhone Xs.<\/p>\n<p><\/span><\/div>\n<div readability=\"44\"><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"32\"><\/p>\n<p>OkemoZurs, a collector of Apple devices, told Motherboard he has used a similar service to checkm8.info successfully. \u201cI\u2019ve actually used something using the same technique as it on some iCloud locked [Activation Lock] devices before,\u201d he said.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>Users in checkm8.info\u2019s Discord server claim they want to use the tool for things like removing the lock on a device they bought.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>\u201cI want to bypass activation lock on a MacBook air 2019 that I bought from an old man for my young brother. Can I run perfectly checkm8 service application on a virtual machine as I only have a Linux based pc,\u201d one user posted in the checkm8.info Discord server in March.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>Motherboard tested the checkm8.info service with a T-Mobile phone that had been reported as stolen. The checkm8.info tool successfully jailbroke the target device, but the portion of the program responsible for bypassing Activation Lock crashed multiple times. This may be because the process requires cellphone signal to complete, and T-Mobile had blocked the phone from receiving or sending messages. The process was very quick however, and could reasonably take place before a victim manages to report their phone as stolen.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30\"><\/p>\n<p>A developer of the checkra1n jailbreak told Motherboard that \u201cI believe there are 2 types of users who look for this kind of a service though: (1) Those who actually steal the phones because they know they can temporarily unlock them and put them up for sale and (2) Users that been scammed and bought a stolen device that either came locked or been locked later on.\u201d<\/p>\n<p><\/span><\/div>\n<div readability=\"39.99077954736\"><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"31\"><\/p>\n<p>The checkm8.info administrator added \u201cI personally consider Apple is too strict with their vendor lock policy. If you check the Apple niche forums on the web, there are tons of claims by users who got their accounts locked for many different reasons and are not able to regain access to them or not able to recover lost passwords for their accounts.\u201d<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"30.466453674121\"><\/p>\n<p>People in the jailbreaking and iPhone security research community are convinced the service is for illegal purposes\u2014to unlock stolen iPhones. Axi0mX, the developer of the <a href=\"https:\/\/twitter.com\/axi0mX\/status\/1177542201670168576\" target=\"_blank\" rel=\"noopener\">checkm8 exploit<\/a>, told Motherboard in an online chat that services that bypass the Activation Lock would be useful to unlock stolen phones.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"33\"><\/p>\n<p>\u201cI\u2019m disappointed to see that (for most of them) the checkera1n <em>[sic] <\/em>team\u2019s efforts were abused to provide such services,\u201d a security researcher who specializes in hacking iOS, who asked to remain anonymous as he wasn\u2019t authorized to speak to the press, told Motherboard. \u201cI am just an enthusiastic checkra1n user. What I find upsetting is that people are using a research tool to make software that will likely aid the iPhone theft industry\u2014and the fact that they\u2019re making money off freely released work.\u201d<\/p>\n<p><\/span><\/div>\n<div readability=\"30.690265486726\"><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29.787610619469\"><\/p>\n<p>The checkm8.info administrator behind checkm8.info said that the service does not cover stolen devices. They said the service uses an API from the GSMA, the trade body for the wireless industry, to check whether a device has been \u201cblacklisted,\u201d which can mean the device was lost or stolen. This is an additional protection on top of Apple\u2019s own Activation Lock. Network carriers and repair companies <a href=\"https:\/\/www.gsma.com\/services\/tac\/about-device-check\/\" target=\"_blank\" rel=\"noopener\">use this API to check for that stolen status<\/a>.<\/p>\n<p><\/span><\/div>\n<div readability=\"44.137751561416\"><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"25.485436893204\"><\/p>\n<p>\u201cProtect your reputation by reducing the likelihood of accepting stolen or lost devices,\u201d the GSMA\u2019s website reads in a section describing how the Device Check service <a href=\"https:\/\/www.gsma.com\/services\/tac\/devicecheck-recyclers\/\" target=\"_blank\" rel=\"noopener\">can be used by device recyclers<\/a>.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>The administrator of checkm8.info claimed they used the GSMA tool to spot stolen devices and block them from using the jailbreak.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>\u201cWe decline such devices as well in our system,\u201d they wrote in an email.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29.423645320197\"><\/p>\n<p>That API would only work if the victim reported their device as stolen, however. <a href=\"https:\/\/www.gsma.com\/services\/wp-content\/uploads\/2018\/08\/GSMA-Device-Check-Recycler-Flyer.pdf\" target=\"_blank\" rel=\"noopener\">After a consumer reports their device stolen<\/a>, their operator then marks the IMEI\u2014a unique identifying code\u2014as belonging to a stolen device. But if a consumer does not self-report the phone as stolen, there may still be a window for a thief to deploy the checkm8.info against a phone that only had Activation Lock enabled.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"28\"><\/p>\n<p>GSMA declined to speak on the record. T-Mobile told Motherboard it reports stolen devices to the GSMA database.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p>At least some Apple employees are aware of Checkm8.info\u2019s service. A Product Security employee at Apple follows the group on Twitter. Twitter briefly suspended checkm8.info\u2019s account in April but the account is back online at the time of writing.&nbsp;<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"27\"><\/p>\n<p>Apple declined to comment.<\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"29\"><\/p>\n<p><em><strong>UPDATE, 1:45 p.m. ET<\/strong>: A previous version of this story stated that the jailbreaking tool Checkra1n is open source. But it is in fact not open source. <\/em><\/p>\n<p><\/span><span class=\"abc__textblock size--article\" data-component=\"TextBlock\" readability=\"19.105882352941\"><\/p>\n<p><em><strong>Subscribe to our cybersecurity podcast,&nbsp;<a href=\"https:\/\/itunes.apple.com\/gb\/podcast\/cyber\/id1441708044?mt=2\" target=\"_blank\" rel=\"noopener\">CYBER<\/a>. Subscribe to&nbsp;<a href=\"https:\/\/www.twitch.tv\/motherboardtv\" target=\"_blank\" rel=\"noopener\">our new Twitch channel<\/a>.<\/strong><\/em><\/p>\n<p><\/span><\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33508\/The-Underground-Company-That-Hacks-iPhones-For-Ordinary-Consumers.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":46905,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[8675],"class_list":["post-46904","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerphoneflawapple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Underground Company That Hacks iPhones For Ordinary Consumers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Underground Company That Hacks iPhones For Ordinary Consumers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-31T16:27:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Underground Company That Hacks iPhones For Ordinary Consumers\",\"datePublished\":\"2022-05-31T16:27:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/\"},\"wordCount\":1808,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers.jpg\",\"keywords\":[\"headline,hacker,phone,flaw,apple\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/\",\"name\":\"The Underground Company That Hacks iPhones For Ordinary Consumers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers.jpg\",\"datePublished\":\"2022-05-31T16:27:42+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers.jpg\",\"width\":240,\"height\":238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,phone,flaw,apple\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerphoneflawapple\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Underground Company That Hacks iPhones For Ordinary Consumers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Underground Company That Hacks iPhones For Ordinary Consumers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/","og_locale":"en_US","og_type":"article","og_title":"The Underground Company That Hacks iPhones For Ordinary Consumers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-05-31T16:27:42+00:00","og_image":[{"url":"https:\/\/video-images.vice.com\/topics\/57a205628cb727dec795a6b1\/callout_logo\/1614199980283-screen-shot-2021-02-24-at-34918-pm.png?resize=240:*","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Underground Company That Hacks iPhones For Ordinary Consumers","datePublished":"2022-05-31T16:27:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/"},"wordCount":1808,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-underground-company-that-hacks-iphones-for-ordinary-consumers.jpg","keywords":["headline,hacker,phone,flaw,apple"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/","url":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/","name":"The Underground Company That Hacks iPhones For Ordinary Consumers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-underground-company-that-hacks-iphones-for-ordinary-consumers.jpg","datePublished":"2022-05-31T16:27:42+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-underground-company-that-hacks-iphones-for-ordinary-consumers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/05\/the-underground-company-that-hacks-iphones-for-ordinary-consumers.jpg","width":240,"height":238},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-underground-company-that-hacks-iphones-for-ordinary-consumers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,phone,flaw,apple","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerphoneflawapple\/"},{"@type":"ListItem","position":3,"name":"The Underground Company That Hacks iPhones For Ordinary Consumers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=46904"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/46904\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/46905"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=46904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=46904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=46904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}