Over the last few days, several ransomware attack and have been locked out of their computers. Their Mac devices have been locked with a lock screen message asking them to pay a certain amount of money in Bitcoin for the code to unlock.
As per MacRumors, who first reported the issue, hackers have started locking Mac or iPhone remotely using iCloud’s “Find My iPhone” feature and demanding ransom for giving the new .
“With access to an iCloud ’s name and , Find My iPhone on iCloud.com can be used to “lock” a Mac with a code even with two-factor authentication turned on, and that’s what’s going on here,” MacRumors noted.
How did this happen? Well, phishing scams, fake virus alerts, using weak s for your s, the habit of reuse or recent data breach are the reason. Several number of people’s names and s have been exposed in recent attacks and hackers were able to gain access to them. s who use same email/ combination for iCloud are an easy target. These hackers have obtained access to a bunch of iCloud names and s, and are using them to remotely lock people’s computers.
https://twitter.com/dickyutomong/status/896040173309353984?ref_src=twsrc%5Etfw&ref_url=http%3A%2F%2Fmashable.com%2F2017%2F09%2F22%2Ficloud-hack-find-my-mac%2F
What to do now? How to protect yourself?
If this happens to you, the only way to get back control of your Mac is to perform a hard reset (which would mean losing all the data) or pay the hackers.
Otherwise, you’ll have to bring your computer into an Apple Store and your identity to regain access to it.
If you haven’t been hacked yet, the best thing you can do is the change. GO and change your Apple ID . Generate a secure, unique that’s difficult to hack or guess – that you do not use on any of your other s. Also, don’t forget to enable two-factor authentication if it’s not already active on your .
Disable the ‘Find My iPhone’ feature by going into Settings. On your Mac, you can disable ‘Find My Mac’ from the iCloud in System Preferences.
TIP:
Stop reusing email/ combination to avoid any issue. Your s can be misused in several ways and your identity can be hijacked.
Conclusion:
Robust security architecture is one of the key benefits of using an Apple device. Unfortunately, cybercriminals have come up with a workaround for these defenses, turning a useful feature provided by Apple against end s.
Stay safe!