How Offenders Acquire Credentials to Access Stolen Mobile Devices

How Offenders Acquire Credentials to Access Stolen Mobile Devices


### Law Enforcement Closes Down iServer: A Phishing-as-a-Service Platform for Unlocking Stolen Phones

In a notable triumph against cybercriminal activities, a coalition of global law enforcement organizations has effectively dismantled a criminal service that enabled the unlocking of over 1.2 million stolen or lost mobile devices. This service, referred to as iServer, was part of a broader phishing-as-a-service (PhaaS) model operating since 2018, mainly targeting mobile gadgets. This operation signifies an essential advancement in addressing the escalating concerns over mobile phone theft and the future resale of these devices.

#### The iServer Operation: A Phishing-as-a-Service Framework

iServer, situated in Argentina, provided an extensive array of phishing services, including email, text, and voice-focused attacks. Among its notable offerings was a specialized service aimed at assisting criminals in unlocking stolen or lost mobile phones by circumventing security mechanisms like Apple’s **Lost Mode**. This feature, integrated into iPhones, stops unauthorized access without the owner’s passcode. iServer’s platform enabled criminals to conduct phishing attacks to acquire the needed credentials to disable this security, rendering the stolen devices operable again.

As reported by **Europol’s European Cybercrime Center**, the operation led to the apprehension of the Argentinian individual behind iServer and the revelation of over 2,000 “unlockers” who utilized the platform. These unlockers were responsible for phishing the rightful owners of the stolen devices to gather the credentials mandatory for unlocking the phones. Investigators also uncovered 483,000 victims who received phishing communications aimed at obtaining their mobile credentials.

#### How iServer Functioned: Assisting Low-Skilled Criminals

The iServer platform was crafted to be accessible, enabling even low-skilled criminals to engage in the unlawful unlocking of mobile phones. According to **Group-IB**, the cybersecurity firm that initially identified the operation, iServer offered a web-based interface that automated the generation and distribution of phishing pages. These pages replicated genuine cloud-centric mobile platforms, such as iCloud, to deceive victims into submitting their credentials.

The process was simple:

1. **Unlockers**—criminals with expertise in unblocking stolen phones—would collect basic details about the device, including its **IMEI number**, language preferences, and owner information. This data was frequently acquired via the phone’s Lost Mode or cloud-based platforms.

2. The unlockers would use phishing domains supplied by iServer or develop their own to initiate a phishing campaign. They would select an attack scenario, and iServer would produce a phishing page that resembled a legitimate cloud service login page.

3. The phishing page would be forwarded to the victim via SMS, misleading them into entering their credentials.

4. Upon the victim submitting their credentials, the unlocker would receive the information through iServer’s web interface. They could then use these credentials to unlock the device, deactivate Lost Mode, and unlink the phone from the owner’s account.

This procedure allowed criminals to market the stolen phones as if they were brand new, greatly enhancing their value on the black market.

#### The Extent of the Operation

The extent of iServer’s operation was colossal. During its five years in operation, the platform unlocked over **1.2 million mobile phones**. The service attracted a broad spectrum of criminals, from petty thieves to organized crime groups handling substantial quantities of stolen devices. The platform’s user-friendly nature and automation made it available to individuals with minimal technical expertise, compounding the mobile phone theft dilemma.

#### The Takedown: A Joint International Initiative

The takedown of iServer was a result of a synchronized international operation conducted between **September 10 and 17, 2024**, spanning several countries, including **Spain, Argentina, Chile, Colombia, Ecuador, and Peru**. Authorities in these regions had been probing into iServer since 2022, following an alert from Group-IB.

Throughout the operation, law enforcement captured the architect behind iServer and confiscated the **iserver.com** domain, thereby effectively shutting down the platform. Images of the website before and after the operation reveal a stark contrast: once a lively center for illicit activity, the site now displays a law enforcement seizure notice.

#### The Aftermath: A Setback for Mobile Phone Theft

The dismantling of iServer represents a substantial setback for the global trade in stolen mobile phones. By neutralizing a platform that streamlined the process for criminals to unlock and resell stolen devices, law enforcement has disrupted a vital segment of the supply chain for stolen phones. Nonetheless, the issue remains unresolved. Mobile phone theft continues to be a profitable enterprise, and new platforms may emerge to replace the void created by iServer.

#### How to Safeguard Against Phishing Attacks

While the closure of iServer is a positive step forward,