Lookalike Domains Expose the iPhone Theft Economy
Infoblox Threat Intel uncovered a thriving underground economy on Telegram dedicated to unlocking stolen iPhones. Threat actors utilize specialized Windows binaries to extract device information and deploy targeted smishing campaigns via Apple lookalike domains to steal iCloud credentials, allowing them to bypass Activation Lock, wipe the device, and resell the hardware.
Authors: Maël Le Touz, Elena Puga, Infoblox Threat Intel
Source:
Infoblox
- domainapple-mylocation[.]infoApple lookalike phishing domain.
- domainapple[.]com-app[.]ltApple lookalike phishing domain.
- domainapple[.]connect-app[.]infoApple lookalike phishing domain.
- domainapplebrasil[.]infoApple lookalike phishing domain.
- domainapplemap[.]usApple lookalike phishing domain.
- domainapplemaps-support[.]liveInitial Apple lookalike phishing domain used in smishing campaigns to steal iCloud credentials.
- domainapplesupporter[.]usApple lookalike phishing domain.
- domainfind-your-phone[.]helpApple lookalike phishing domain.
- domainfind[.]my-id[.]com[.]esApple lookalike phishing domain.
- domainfindyourphone[.]helpApple lookalike phishing domain.
- domainicloud-f[.]comApple lookalike phishing domain.
- domainicloud[.]sa[.]comApple lookalike phishing domain.
- domainimeicheckex[.]oneDomain observed being processed by the threat actor's automated evasion script to contest security blocks.
- domainiremoval[.]appDomain hosting the API endpoint used by the threat actor's automated Google Safe Browsing evasion script.
- domainlocate-it-now[.]netApple lookalike phishing domain.
- domainlphone-retained-store[.]usApple lookalike phishing domain.
- domainmaps-services[.]cfdPhishing domain observed in the threat actor's FMI OFF control panel used to generate malicious links.
- domainmapsfind[.]infoApple lookalike phishing domain.
- domainnavigate-to-location[.]meApple lookalike phishing domain.
- domainphone[.]xuidns[.]pwApple lookalike phishing domain.
- domainphotos-sharing[.]inApple lookalike phishing domain.
- domainsmartthingsfind-samsung[.]comSamsung lookalike phishing domain.
- domainsupport-lcloud[.]xyzApple lookalike phishing domain.
- domainview-location[.]appApple lookalike phishing domain.
- domainviewlocation[.]appApple lookalike phishing domain.
- urlhxxps://iremoval[.]app/app/webroot/clean_domain/data_domain[.]phpAPI endpoint used by the threat actor's script to fetch domains for Google Safe Browsing evasion.
Detection / HunterGoogle
What Happened
Cybercriminals have created a booming business out of unlocking stolen iPhones. When a phone is stolen, thieves use special software to find the owner's contact information and send them fake text messages pretending to be Apple. If the owner clicks the link and enters their password, the thieves can completely unlock the phone, erase it, and sell it for a high profit, making phone theft highly lucrative. To protect yourself, never click on links in text messages claiming to have found your lost phone, and only use the official Apple Find My app or website.
Key Takeaways
- Thieves use specialized 'FMI OFF' kits and Windows-based unlocking tools to extract device info and craft targeted smishing campaigns against stolen iPhone owners.
- The underground market operates heavily on Telegram, offering pay-as-you-go services for unlocking devices and generating phishing links.
- Attackers prioritize the hardware value over data, wiping devices immediately after unlinking them from iCloud to resell them.
- Threat actors use automated scripts with headless browsers to detect Google Safe Browsing blocks and submit fake delisting requests.
- DNS telemetry shows a 350% increase in traffic to these lookalike domains in 2025.
Affected Systems
- Apple iOS devices (iPhones)
- Apple iCloud accounts
Attack Chain
The attack begins with the physical theft of an iPhone. The thief connects the locked device to a Windows-based unlocking tool to extract the serial number, IMEI, and owner details, sometimes augmenting this with OSINT from Telegram bots. The attacker then uses an 'FMI OFF' smishing kit to send a localized, personalized SMS or WhatsApp message to the victim, containing a link to an Apple lookalike domain. Once the victim enters their iCloud credentials and passcode on the phishing page, the attacker uses them to remotely remove the Activation Lock, wipe the device, and resell it.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: No
The article does not provide specific detection rules, but mentions that a full list of indicators is available on the Infoblox open GitHub repository.
Detection Engineering Assessment
EDR Visibility: Low — The attack primarily targets personal mobile devices and consumer iCloud accounts, which are typically outside the scope of corporate EDR deployments. The unlocking tools run on the attacker's own infrastructure. Network Visibility: Medium — DNS telemetry can identify lookalike domains, but the smishing delivery happens over cellular networks or encrypted messaging apps like WhatsApp, bypassing corporate network inspection. Detection Difficulty: Hard — Smishing occurs out-of-band on personal devices, and the phishing domains are spun up and rotated quickly, making proactive detection difficult without broad DNS visibility.
Required Log Sources
- DNS query logs
- Mobile Device Management (MDM) logs
- Web Proxy logs
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Consider hunting for DNS queries to newly registered domains containing Apple-themed keywords (e.g., 'icloud', 'find', 'location') combined with generic TLDs. | DNS query logs | Delivery | Medium |
| If you have MDM visibility, consider monitoring for unexpected device unenrollment or remote wipe commands originating from unknown IP addresses. | MDM logs | Impact | Low |
Control Gaps
- Lack of visibility into personal SMS/WhatsApp messages
- Inability to prevent users from entering credentials on personal devices
Key Behavioral Indicators
- DNS queries to domains mimicking Apple Find My services
- Automated headless browser traffic to Google Safe Browsing reporting endpoints originating from non-standard infrastructure
False Positive Assessment
- Low
Recommendations
Immediate Mitigation
- Verify against your organization's incident response runbook and team escalation paths before acting.
- Block the provided lookalike domains and known phishing URLs at the corporate firewall and DNS resolvers.
Infrastructure Hardening
- Evaluate whether corporate MDM policies enforce strict Activation Lock and prevent unauthorized device unenrollment.
- Consider implementing DNS sinkholing for newly registered domains containing high-risk keywords related to Apple or iCloud.
User Protection
- If applicable, ensure corporate mobile devices are enrolled in an MDM solution that can track and lock lost devices independently of consumer iCloud accounts.
Security Awareness
- Educate employees about the risks of smishing, specifically warning them that Apple will never send SMS messages with links to locate a lost device.
- Instruct users to only use the official 'Find My' app or iCloud.com directly when attempting to locate a lost or stolen device.
MITRE ATT&CK Mapping
- T1566.002 - Phishing: Spearphishing Link
- T1566.003 - Phishing: Spearphishing via Service
- T1583.001 - Acquire Infrastructure: Domains
- T1589.002 - Gather Victim Identity Information: Email Addresses
- T1531 - Account Access Removal
Additional IOCs
- Domains:
viewlocation[[.]]app- Apple lookalike phishing domain.find-your-phone[[.]]help- Apple lookalike phishing domain.findyourphone[[.]]help- Apple lookalike phishing domain.apple[[.]]com-app[[.]]lt- Apple lookalike phishing domain.applemap[[.]]us- Apple lookalike phishing domain.applesupporter[[.]]us- Apple lookalike phishing domain.smartthingsfind-samsung[[.]]com- Samsung lookalike phishing domain.navigate-to-location[[.]]me- Apple lookalike phishing domain.lphone-retained-store[[.]]us- Apple lookalike phishing domain.view-location[[.]]app- Apple lookalike phishing domain.photos-sharing[[.]]in- Apple lookalike phishing domain.find[[.]]my-id[[.]]com[[.]]es- Apple lookalike phishing domain.apple[[.]]connect-app[[.]]info- Apple lookalike phishing domain.support-lcloud[[.]]xyz- Apple lookalike phishing domain.icloud-f[[.]]com- Apple lookalike phishing domain.mapsfind[[.]]info- Apple lookalike phishing domain.locate-it-now[[.]]net- Apple lookalike phishing domain.apple-mylocation[[.]]info- Apple lookalike phishing domain.applebrasil[[.]]info- Apple lookalike phishing domain.icloud[[.]]sa[[.]]com- Apple lookalike phishing domain.phone[[.]]xuidns[[.]]pw- Apple lookalike phishing domain.
- Urls:
hxxps://iremoval[.]app/app/webroot/clean_domain/data_domain.php- API endpoint used by the threat actor's script to fetch domains for Google Safe Browsing evasion.