{"id":53400,"date":"2017-12-20T09:00:00","date_gmt":"2017-12-20T01:00:00","guid":{"rendered":"https:\/\/blog.trendmicro.com.tw\/?p=53400"},"modified":"2017-12-07T21:27:03","modified_gmt":"2017-12-07T13:27:03","slug":"%e5%87%ba%e5%9c%8b%e6%97%85%e8%a1%8c%e7%95%b6%e5%bf%83%e6%89%8b%e6%a9%9f%e8%a2%ab%e6%89%92%e5%8e%bb%e5%b9%b4%e6%9c%8923000-%e5%8f%b0-iphone%e5%9c%a8%e9%82%81%e9%98%bf%e5%af%86%e6%a9%9f%e5%a0%b4","status":"publish","type":"post","link":"https:\/\/blog.trendmicro.com.tw\/?p=53400","title":{"rendered":"\u51fa\u570b\u65c5\u884c\u7576\u5fc3\u624b\u6a5f\u88ab\u6252,\u53bb\u5e74\u670923,000 \u53f0 iPhone\u5728\u9081\u963f\u5bc6\u6a5f\u5834\u5931\u7aca!"},"content":{"rendered":"<h3>\u7d50\u5408\u771f\u5be6\u4e16\u754c\u7684\u7db2\u8def\u72af\u7f6a,\u7aca\u8cca\u5148\u89e3\u9396Apple \u88dd\u7f6e,\u518d\u92b7\u8d13\u8f49\u8ce3<\/h3>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2016\/05\/Mobile04-200x200.jpg\" \/>\u7db2\u8def\u8a50\u9a19\u8207\u771f\u5be6\u4e16\u754c\u72af\u7f6a\u5df2\u7d93\u958b\u59cb\u51fa\u73fe<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/iphone-phishing-scam-physical-crime\/\">\u4ea4\u96c6<\/a>\u3002\u6839\u64da<a href=\"https:\/\/www.trendmicro.com.tw\/edm\/Tracking.asp?id=2651&amp;name=20110916\">\u8da8\u52e2\u79d1\u6280<\/a>\u4eca\u5e74 5 \u6708\u6240\u770b\u5230\u7684\u4e00\u6a01\u6848\u4f8b\uff0c\u6b79\u5f92\u5229\u7528\u5de5\u5177\u7834\u89e3 iCloud \u5e33\u865f\u4ee5\u89e3\u9396\u5077\u4f86\u7684 iPhone \u624b\u6a5f\u3002\u7d93\u904e\u9032\u4e00\u6b65\u8ffd\u67e5\u4e4b\u5f8c\uff0c\u6211\u5011\u767c\u73fe\u72af\u7f6a\u96c6\u5718\u8de8\u754c\u7684\u7a0b\u5ea6\u76f8\u7576\u6df1\u3002\u4eca\u65e5\u5168\u7403\u624b\u6a5f\u92b7\u8d13\u5e02\u5834\u5176\u5be6\u5df2\u5177\u5099\u76f8\u7576\u7684\u898f\u6a21\uff0c\u800c\u7834\u89e3 iCloud \u5247\u662f\u5176\u4e2d\u91cd\u8981\u4e00\u74b0\u3002\u5f9e<a href=\"https:\/\/www.garda.ie\/Controller.aspx?Page=19996\">\u611b\u723e\u862d<\/a>\u3001<a href=\"https:\/\/www.ons.gov.uk\/peoplepopulationandcommunity\/crimeandjustice\/bulletins\/focusonpropertycrime\/yearendingmarch2016#mobile-phone-theft\">\u82f1\u570b<\/a>\u5230<a href=\"https:\/\/www.hindustantimes.com\/delhi-news\/trouble-calling-120-phones-stolen-every-day-in-delhi\/story-8G1wNfMvwPAelTlvF4iTEN.html\">\u5370\u5ea6<\/a>\u3001<a href=\"https:\/\/www.thebubble.com\/report-5000-phones-are-stolen-in-argentina-every-day\/\">\u963f\u6839\u5ef7<\/a>\u53ca<a href=\"https:\/\/news.nationalgeographic.com\/2015\/09\/150909-inside-global-trade-stolen-smart-phones-brazil\/\">\u7f8e\u570b<\/a>\uff0c\u5931\u7aca\u88dd\u7f6e\u89e3\u9396\u670d\u52d9\u7684\u9700\u6c42\u4ee4\u4eba\u4e4d\u820c\uff1a\u53bb\u5e74\uff0c\u5931\u7aca\u7684 iPhone \u624b\u6a5f\u5728\u6771\u6b50\u570b\u5bb6\u53ef\u8ce3\u5230 2,100 \u7f8e\u5143\u4e4b\u8b5c\uff0c\u800c\u7f8e\u570b\u53bb\u5e74\u4e5f\u6709 23,000 \u53f0 iPhone (\u7e3d\u50f9\u503c 670 \u842c\u7f8e\u5143) \u5728\u9081\u963f\u5bc6\u570b\u969b\u6a5f\u5834<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/53dqyn\/gang-allegedly-used-fake-id-and-a-tractor-to-steal-6-million-worth-of-iphones\">\u5931\u7aca<\/a>\u3002<\/p>\n<p>&nbsp;<\/p>\n<p><strong>\u5047\u5192 Apple \u540d\u7fa9\u767c\u9001\u4e00\u5c01\u96fb\u5b50\u90f5\u4ef6\u6216\u7c21\u8a0a\u7d66\u53d7\u5bb3\u8005<\/strong><\/p>\n<p>\u99ed\u5ba2\u7684\u624b\u6cd5\u76f8\u7576\u76f4\u63a5\uff0c\u4ed6\u5011<a href=\"https:\/\/blog.trendmicro.com.tw\/?p=50185\">\u5047\u5192 Apple \u540d\u7fa9\u767c\u9001\u4e00\u5c01\u96fb\u5b50\u90f5\u4ef6\u6216\u7c21\u8a0a\u7d66\u53d7\u5bb3\u8005\uff0c\u901a\u77e5\u4ed6\u5011\u5931\u7aca\u7684\u88dd\u7f6e\u5df2\u7d93\u5c0b\u7372<\/a>\u3002\u6b64\u6642\uff0c\u5fc3\u6025\u5982\u711a\u7684\u53d7\u5bb3\u8005\u5f88\u53ef\u80fd\u4e0d\u5047\u601d\u7d22\u5c31\u9ede\u4e0b\u8a0a\u606f\u96a8\u9644\u7684\u9023\u7d50\uff0c\u9032\u800c\u9023\u4e0a\u6b79\u5f92\u7528\u4f86\u9a19\u53d6\u53d7\u5bb3\u8005 iCloud \u767b\u5165\u6191\u8b49\u7684\u7db2\u9801\uff0c\u5f97\u624b\u4e4b\u5f8c\uff0c\u6b79\u5f92\u5c31\u80fd\u89e3\u9396\u5077\u4f86\u7684 iPhone \u624b\u6a5f\u3002\u7aca\u8cca\u6703\u900f\u904e\u7b2c\u4e09\u65b9 iCloud \u7db2\u8def\u91e3\u9b5a\u670d\u52d9\u4f86\u89e3\u9396\u88dd\u7f6e\u3002\u9019\u4e9b iCloud \u7db2\u8def\u91e3\u9b5a\u670d\u52d9\u696d\u8005\u6240\u7528\u7684\u72af\u7f6a\u5de5\u5177\u5305\u62ec\uff1aMagicApp\u3001Applekit \u8207 Find My iPhone (FMI.php) \u67b6\u69cb\uff0c\u751a\u81f3\u5efa\u7acb\u4e86\u81ea\u52d5\u5316 iCloud \u89e3\u9396\u6d41\u7a0b\uff0c\u88dd\u7f6e\u4e00\u65e6\u89e3\u9396\u4e4b\u5f8c\uff0c\u5c31\u80fd\u8ce3\u5230\u5730\u4e0b\u5e02\u5834\u6216\u7070\u8272\u5e02\u5834 (gray market)\u3002<\/p>\n<p>\u9019\u985e iCloud \u89e3\u9396\u670d\u52d9\u5927\u591a\u5229\u7528\u793e\u7fa4\u7db2\u7ad9\u6216\u500b\u4eba\u7db2\u7ad9\u4f86\u7d93\u71df\u3002\u6b64\u5916\uff0c\u4e5f\u63d0\u4f9b\u670d\u52d9\u8f49\u552e\u6216\u4f3a\u670d\u5668\u79df\u7528 (\u66ff\u4eba\u767c\u9001\u7db2\u8def\u91e3\u9b5a\u8a0a\u606f)\u3002\u9019\u985e\u670d\u52d9\u7684\u5ba2\u6236\u904d\u53ca\u5168\u7403\uff0c\u5982\uff1a\u7fa9\u5927\u5229\u3001\u6cd5\u570b\u3001\u897f\u73ed\u7259\u3001\u7f8e\u570b\u3001\u5370\u5ea6\u3001\u6c99\u70cf\u5730\u963f\u62c9\u4f2f\u3001\u5df4\u897f\u4ee5\u53ca\u83f2\u5f8b\u8cd3\u3002\u96d6\u7136\u6211\u5011\u53ea\u7814\u7a76\u4e86\u4e09\u500b iCloud \u89e3\u9396\u61c9\u7528\u7a0b\u5f0f\u548c\u670d\u52d9\uff0c\u4f46\u7db2\u8def\u4e0a\u53ef\u627e\u5230\u7684\u9084\u66f4\u591a\uff0c\u53ea\u8981\u641c\u5c0b\u4e00\u4e0b\u793e\u7fa4\u5a92\u9ad4\u3001\u7db2\u8def\u5ee3\u544a\u548c\u96fb\u5b50\u5546\u52d9\u7db2\u7ad9\u5373\u53ef\u3002<\/p>\n<p>\u6211\u5011\u767c\u73fe\u7684\u6848\u4f8b\u727d\u6d89\u5230\u79d1\u7d22\u6c83\u3001\u83f2\u5f8b\u8cd3\u3001\u5370\u5ea6\u548c\u5317\u975e\u7b49\u570b\u7684\u6578\u500b\u72af\u7f6a\u96c6\u5718\u3002\u958b\u767c AppleKit \u7684\u99ed\u5ba2\u5728\u4e00\u500b\u53eb\u300cdev-point\u300d\u7684<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/the-middle-eastern-and-north-african-underground-where-culture-and-cybercrime-meet\">\u963f\u62c9\u4f2f\u99ed\u5ba2\u8ad6\u58c7<\/a>\u4e0a\u76f8\u7576\u6d3b\u8e8d\u3002\u4f7f\u7528 MagicApp \u6216 AppleKit \u5169\u5957\u5de5\u5177\u7684\u5ba2\u6236\u4e26\u4e0d\u4e00\u5b9a\u975e\u7528\u7db2\u8def\u91e3\u9b5a\u8173\u672c\u4e0d\u53ef\uff0c\u4f46\u56e0\u70ba\u958b\u767c\u4eba\u54e1\u5927\u591a\u719f\u6089\u5f7c\u6b64\u7684\u7522\u54c1 (\u800c\u4e14\u6210\u529f\u7387\u9817\u9ad8)\uff0c\u56e0\u6b64\u8a31\u591a\u4eba\u90fd\u50be\u5411\u5c07\u4e09\u8005\u5408\u4f75\u4f7f\u7528\u3002<\/p>\n<p><strong><em>\u5229\u7528\u7db2\u8def\u91e3\u9b5a\u9a19\u53d6\u767b\u5165\u6191\u8b49<\/em><\/strong><br \/>\n\u4ee5\u4e0b\u662f\u6b79\u5f92\u72af\u6848\u624b\u6cd5\u793a\u610f\u5716\u3002\u99ed\u5ba2\u4e00\u65e6\u53d6\u5f97\u4e86\u53d7\u5bb3\u8005\u7684 iCloud \u5e33\u865f\uff0c\u5176\u5de5\u5177\u5c31\u53ef\u4ee5\u4e0b\u8f09 iCloud \u5e33\u865f\u4f86\u5f9e\u4e8b\u5176\u4ed6\u72af\u7f6a\u6d3b\u52d5\uff0c\u7136\u5f8c\u518d\u5c07\u5b83\u522a\u9664\u3002<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2017\/11\/physical-theft-meets-cybercrime-1.jpg\" \/><br \/>\n<em>\u5716 1\uff1a\u99ed\u5ba2\u72af\u7f6a\u624b\u6cd5\u793a\u610f\u5716\u3002<\/em><!--more--><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2017\/11\/physical-theft-meets-cybercrime-2.png\" \/><br \/>\n<em>\u5716 2\uff1aGithub \u4e0a\u4e00\u500b\u7528\u4f86\u5047\u5192 Apple \u9a57\u8b49\u540d\u7fa9\u9032\u884c\u7db2\u8def\u91e3\u9b5a\u8a50\u9a19\u7684\u8173\u672c (2017 \u5e74 3 \u6708 21 \u65e5)\u3002<\/em><\/p>\n<p>\u6211\u5011\u5728 Github \u4e0a\u7684\u4e00\u500b\u516c\u958b\u7a0b\u5f0f\u78bc\u8cc7\u6599\u5eab\u7576\u4e2d\u627e\u5230\u67d0\u500b\u7db2\u8def\u91e3\u9b5a\u7db2\u9801\u7684\u90e8\u5206\u539f\u59cb\u7a0b\u5f0f\u78bc\uff0c\u4e5f\u627e\u5230\u4e86\u5176\u4ed6\u7528\u4f86\u7522\u751f iCloud \u7db2\u8def\u91e3\u9b5a\u9801\u9762\u7684\u5de5\u5177\u3002\u9019\u500b\u7db2\u8def\u91e3\u9b5a\u7db2\u9801\u63a1\u7528\u4e86\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u53e3\u4e2d\u6240\u7a31\u7684\u300c<em>FMI.php<\/em>\u300d(Find My iPhone \u67b6\u69cb) \/ Devjo \u985e\u5225\uff0c\u8a72\u5143\u4ef6\u4e5f\u5b58\u5728\u65bc\u8a31\u591a\u5176\u4ed6\u7db2\u8def\u91e3\u9b5a\u5957\u4ef6\u3002\u9019\u662f\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u624b\u4e2d\u6700\u63a5\u8fd1 Apple \u5b98\u65b9 Find My iPhone \u61c9\u7528\u7a0b\u5f0f\u958b\u767c\u4ecb\u9762 (API) \u7684\u5957\u4ef6\u3002<\/p>\n<p>\u7576\u4f7f\u7528\u8005\u5728\u7db2\u8def\u91e3\u9b5a\u9801\u9762\u4e0a\u8f38\u5165\u4e86\u767b\u5165\u6191\u8b49\u4e4b\u5f8c\uff0c\u99ed\u5ba2\u5c31\u80fd\u5229\u7528 <em>FMI.php<\/em> \u67b6\u69cb\u4f86\u53d6\u5f97\u4f7f\u7528\u8005 iCloud \u5e33\u865f\u7684\u76f8\u95dc\u8cc7\u8a0a\uff0c\u5982\uff1a\u624b\u6a5f\u865f\u78bc\u3001\u5bc6\u78bc\u9577\u5ea6\u3001ID\u3001GPS \u5b9a\u4f4d\u3001\u88dd\u7f6e\u662f\u5426\u5df2\u88ab\u9396\u4f4f\uff0c\u4ee5\u53ca\u4f7f\u7528\u8005\u662f\u5426\u5df2\u4e0b\u9054\u6e05\u9664\u88dd\u7f6e\u7684\u6307\u4ee4\u3002\u6b64\u5916\uff0c\u5728\u88dd\u7f6e\u89e3\u9396\u4e4b\u5f8c\uff0c<em>FMI.php <\/em>\u67b6\u69cb\u9084\u53ef\u5c07\u53d7\u5bb3\u8005\u7684\u88dd\u7f6e\u5f9e\u5176 Apple \u5e33\u6236\u4e0a\u522a\u9664\u3002\u4e0d\u50c5\u5982\u6b64\uff0c\u5982\u679c\u53d7\u5bb3\u8005\u771f\u7684\u4e0a\u7576\uff0c\u99ed\u5ba2\u9084\u6703\u6536\u5230\u96fb\u5b50\u90f5\u4ef6\u901a\u77e5\u3002<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2017\/11\/physical-theft-meets-cybercrime-3.png\" \/><br \/>\n<em>\u5716 3\uff1a\u99ed\u5ba2\u7d93\u7531\u96fb\u5b50\u90f5\u4ef6\u6536\u5230\u53d7\u5bb3\u8005\u7684 Apple ID \u548c\u5bc6\u78bc\u3002<\/em><\/p>\n<p>\u793e\u7fa4\u5a92\u9ad4\u4e0a\u6709\u5f88\u591a\u9019\u985e\u7db2\u8def\u91e3\u9b5a\u5de5\u5177\u5957\u4ef6\u7684\u5ee3\u544a\uff0c\u751a\u81f3\u9084\u5305\u542b\u5b8c\u6574\u7684\u4f7f\u7528\u6559\u5b78\u3002\u5176\u529f\u80fd\u5305\u62ec\uff1a<\/p>\n<ul>\n<li>\u96fb\u5b50\u90f5\u4ef6\u901a\u77e5\uff0c\u5305\u542b\u53d7\u5bb3\u8005\u7684 IP \u4f4d\u5740\u3001HTTP \u53c3\u7167\u4f4d\u5740\u3001\u700f\u89bd\u5668\u7684 User-Agent \u7b49\u7b49\u3002<\/li>\n<li>\u5b58\u53d6\u53d7\u5bb3\u8005\u7684 iCloud \u5e33\u6236\uff0c\u53d6\u5f97\u88dd\u7f6e\u8cc7\u8a0a\u3001\u89e3\u9396\u88dd\u7f6e\u3001\u6216\u5c07\u88dd\u7f6e\u5f9e\u5e33\u6236\u4e2d\u522a\u9664\u3002<\/li>\n<li>\u9632\u6b62\u641c\u5c0b\u5f15\u64ce\u7684\u5730\u6bef\u5f0f\u641c\u7d22\uff0c\u9632\u6b62\u9632\u6bd2\u8edf\u9ad4\u6383\u7784\uff0c\u85c9\u7531 IP \u7bc4\u570d\u4f86\u5c01\u9396\u3002<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><em>AppleKit\uff1aiCloud \u5e33\u865f\u7834\u89e3\u670d\u52d9<\/em><\/strong><br \/>\n\u9664\u4e86\u7db2\u8def\u91e3\u9b5a\u5de5\u5177\u5957\u4ef6\u4e4b\u5916\uff0c\u72af\u7f6a\u96c6\u5718\u9084\u63d0\u4f9b\u5176\u4ed6\u670d\u52d9\u4f86\u5354\u52a9\u99ed\u5ba2\u540c\u4f34\u5011\u5efa\u7acb\u81ea\u5df1\u7684\u4e8b\u696d\u3002\u5176\u4e2d\u4e4b\u4e00\u5c31\u662f AppleKit\uff0c\u5176\u5167\u542b\u4e00\u500b\u7db2\u9801\u63a7\u5236\u53f0\uff0c\u53ef\u6aa2\u8996\u5df2\u7834\u89e3\u7684\u88dd\u7f6e\u3002AppleKit \u652f\u63f4\u7684\u88dd\u7f6e\u6709\uff1aiPhone\u3001iPad\u3001Mac \u548c Apple Watch\uff0c\u800c\u4e14\u64da\u8aaa\u6703\u5b9a\u671f\u66f4\u65b0\u4e26\u65b0\u589e\u529f\u80fd\u3002<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2017\/11\/physical-theft-meets-cybercrime-4.png\" \/><br \/>\n<em>\u5716 4\uff1aAppleKit \u7684\u63a7\u5236\u53f0\u3002<\/em><\/p>\n<p><strong><em>MagicApp\uff1a\u81ea\u52d5\u5316 iCloud \u5e33\u865f\u7834\u89e3<\/em><\/strong><br \/>\nMagicApp \u5df2\u5c07 iPhone \u89e3\u9396\u6d41\u7a0b\u81ea\u52d5\u5316\uff0c\u4e26\u53ef\u642d\u914d\u5176\u4ed6\u653b\u64ca\u9014\u5f91\u4f86\u4f7f\u7528\u3002\u5fc5\u9808\u662f\u5df2\u8d8a\u7344\u7684 Apple \u88dd\u7f6e\u624d\u80fd\u57f7\u884c MagicApp\uff0c\u56e0\u70ba\u8a72\u7a0b\u5f0f\u4e26\u672a\u901a\u904e Apple \u5b98\u65b9 App Store \u7684\u8a8d\u8b49\u3002MagicApp \u53ef\u5728\u7db2\u8def\u4e0a\u514d\u8cbb\u4e0b\u8f09\uff0c\u4e5f\u53ef\u4ee5\u5728 Github \u4e0a\u627e\u5230\uff0c\u5982\u4e0b\u6240\u793a\uff1a<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2017\/11\/physical-theft-meets-cybercrime-5.png\" \/><br \/>\n<em>\u5716 5\uff1aMagicApp \u5728 Github \u4e0a\u7684\u8cc7\u6599\u3002<\/em><\/p>\n<p>MagicApp \u63d0\u4f9b\u4e86\u5b8c\u6574\u7684\u5931\u7aca\u88dd\u7f6e\u89e3\u9396\u529f\u80fd\uff0c\u5305\u62ec\u767c\u9001\u7db2\u8def\u91e3\u9b5a\u90f5\u4ef6\u6216\u7c21\u8a0a\u3002\u5176\u4e2d\u6bcf\u500b\u6b04\u4f4d\u90fd\u53ef\u4ee5\u81ea\u8a02\uff0c\u56e0\u6b64\u99ed\u5ba2\u53ef\u4ee5\u7576\u5730\u8a9e\u8a00\u767c\u9001\u7c21\u8a0a\u3002\u9664\u6b64\u4e4b\u5916\uff0c\u9084\u53ef\u767c\u9001\u5047\u7684 GPS \u5b9a\u4f4d\u8cc7\u8a0a\u8b93\u53d7\u5bb3\u8005\u76f8\u4fe1\u5176\u88dd\u7f6e\u5df2\u7d93\u5c0b\u7372\u3002MagicApp \u751a\u81f3\u63d0\u4f9b\u4e86 50 \u500b\u53ef\u5ba2\u88fd\u5316\u7684\u7db2\u8def\u91e3\u9b5a\u7bc4\u672c\uff0c\u6db5\u84cb\u6bcf\u4e00\u7a2e Apple \u88dd\u7f6e\u3002<\/p>\n<p>\u540c\u6642\uff0c\u958b\u767c MagicApp \u7684\u99ed\u5ba2\u9084\u548c\u53e6\u4e00\u500b\u7db2\u7ad9\u300ciUnlocker.net\u300d\u5408\u4f5c\uff0c\u5f8c\u8005\u53ef\u67e5\u770b\u88dd\u7f6e\u5728 iCloud \u4e0a\u7684\u72c0\u614b\u4ee5\u53ca\u4f7f\u7528\u7684\u96fb\u4fe1\u5ee0\u5546\u662f\u54ea\u4e00\u5bb6\u3002\u800c\u4e14\uff0ciUnlocker \u9084\u53ef\u89e3\u958b IMEI \u5df2\u88ab\u96fb\u4fe1\u696d\u8005\u5c01\u9396\u7684\u624b\u6a5f\u3002<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/files\/2017\/11\/physical-theft-meets-cybercrime-6.png\" \/><br \/>\n<em>\u5716 6\uff1a\u4f7f\u7528 iUnlocker \u4f86\u6aa2\u67e5\u88dd\u7f6e\u7684 IMEI \u662f\u5426\u5df2\u88ab\u5c01\u9396 (\u7531\u5206\u6790\u4eba\u54e1 <\/em><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/author\/juzhu\/\"><em>Ju Zhu<\/em><\/a><em> \u6240\u63d0\u4f9b)\u3002<\/em><\/p>\n<p><strong>\u4fdd\u8b77\u884c\u52d5\u88dd\u7f6e,\u990a\u6210\u4e94\u500b\u597d\u7fd2\u6163<\/strong><br \/>\n\u5982\u540c\u7db2\u969b\u7db2\u8def\u7684\u767c\u5c55\u5df2\u6539\u8b8a<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/turning-your-data-against-you-cybercrime\">\u8cc7\u8a0a<\/a>\u5b58\u53d6\u8207\u4f01\u696d\u7d93\u71df\u7684\u65b9\u5f0f\uff0c\u771f\u5be6\u4e16\u754c\u8207\u7db2\u8def\u4e16\u754c\u7684\u72af\u7f6a\u4e5f\u958b\u59cb\u4e0d\u518d\u6d87\u6e2d\u5206\u660e\u3002\u771f\u5be6\u4e16\u754c\u7684\u7aca\u76dc\u5df2\u4e0d\u518d\u4fb7\u9650\u65bc\u771f\u5be6\u4e16\u754c\uff0c\u5f9e\u4e0a\u8ff0\u5de5\u5177\u6211\u5011\u53ef\u4ee5\u767c\u73fe\u6b79\u5f92\u5df2\u5de7\u5999\u7d50\u5408\u7db2\u8def\u72af\u7f6a\u8207\u50b3\u7d71\u72af\u7f6a\uff0c\u751a\u81f3\u76f8\u8f14\u76f8\u6210\uff0c\u7576\u7136\u7372\u5229\u4e5f\u66f4\u4e0a\u5c64\u6a13\u3002\u4f8b\u5982\u4eca\u5e74 9 \u6708\uff0c\u7db2\u8def\u72af\u7f6a\u96c6\u5718\u5728\u53d6\u5f97 iCloud \u767b\u5165\u6191\u8b49\u4e4b\u5f8c\uff0c\u5229\u7528 Apple \u7684\u5c0b\u627e\u88dd\u7f6e\u670d\u52d9\u5f9e\u9060\u7aef\u5c07 Mac \u9396\u4f4f\uff0c\u8b93\u4f7f\u7528\u8005<a href=\"https:\/\/www.digitaltrends.com\/computing\/apple-find-my-ransom\/\">\u7121\u6cd5\u9032\u5165<\/a>\u81ea\u5df1\u7684\u88dd\u7f6e\u4ee5\u85c9\u6a5f\u52d2\u7d22\u3002\u4f7f\u7528\u8005\u56e0\u6b64\u9762\u81e8\u4e86\u5fc5\u9808\u91cd\u704c\u88dd\u7f6e\u4e26\u5931\u53bb\u6240\u6709\u8cc7\u6599\u7684\u98a8\u96aa\u3002<br \/>\n\u7e3d\u6b78\u4e00\u53e5\u8a71\uff1a\u8ca1\u7522\u5b89\u5168\u8207\u7db2\u8def\u8cc7\u5b89\u4e00\u6a23\u91cd\u8981\uff0c\u9664\u4e86\u96a8\u6642\u7559\u610f\u81ea\u5df1\u7684\u88dd\u7f6e\u4ee5\u9632\u6b62\u906d\u7aca\u4e4b\u5916\uff0c\u8cc7\u5b89\u610f\u8b58\u4e5f\u5f88\u91cd\u8981\uff1a<\/p>\n<ol>\n<li>\u990a\u6210<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/mobile-safety\/a-practical-guide-to-mobile-safety\">\u826f\u597d\u7fd2\u6163<\/a>\u4ee5\u4fdd\u969c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/mobile-safety\/best-practices-securing-your-mobile-device\">\u884c\u52d5\u88dd\u7f6e\u5b89\u5168<\/a>\uff0c\u5728 iCloud \u5e33\u865f\u4e0a\u555f\u7528\u96d9\u91cd\u8a8d\u8b49\uff0c\u4e26\u958b\u555f\u88dd\u7f6e\u7684\u5b89\u5168\u529f\u80fd\uff0c\u5982\uff1a\u5c0b\u627e\u6211\u7684 iPhone\u3001\u81ea\u52d5\u9396\u5b9a\u3002<\/li>\n<li><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/virtualization-and-cloud\/best-practices-backing-up-data\">\u5b9a\u671f\u5099\u4efd\u8cc7\u6599<\/a>\u4ee5\u6e1b\u5c11\u88dd\u7f6e\u907a\u5931\u7684\u640d\u5931\u3002<\/li>\n<li>\u7576\u88dd\u7f6e\u907a\u5931\u6216\u5931\u7aca\u6642\uff0c\u7acb\u5373\u901a\u77e5\u96fb\u4fe1\u696d\u8005\uff0c\u4e0d\u8b93\u6b79\u5f92\u6709\u6a5f\u6703\u7e7c\u7e8c\u4f7f\u7528\u8a72\u88dd\u7f6e\u3002<\/li>\n<\/ol>\n<ol start=\"4\">\n<li>\u591a\u591a\u7559\u610f<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/best-practices-identifying-and-mitigating-phishing-attacks\">\u7db2\u8def\u91e3\u9b5a\u8de1\u8c61<\/a>\uff0c\u5c24\u5176\u5c0f\u5fc3\u90a3\u4e9b\u4e0d\u8acb\u81ea\u4f86\u3001\u800c\u4e14\u5411\u60a8\u8981\u6c42\u8f38\u5165 iCloud \u6216 Apple ID \u767b\u5165\u6191\u8b49\u7684\u96fb\u5b50\u90f5\u4ef6\u6216\u7c21\u8a0a\u3002<\/li>\n<li>\u5de5\u4f5c\u5834\u6240\u61c9\u8a72\u5f37\u5236\u5be6\u65bd<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/-infosec-guide-bring-your-own-device-byod\">\u56b4\u683c\u7684\u8cc7\u5b89\u653f\u7b56<\/a>\uff0c\u5c24\u5176\u662f\u6703\u5132\u5b58\u6216\u8655\u7406\u654f\u611f\u8cc7\u8a0a\u7684\u88dd\u7f6e\u3002<\/li>\n<\/ol>\n<p>\u66f4\u91cd\u8981\u7684\u662f\uff0c\u8981\u591a\u505a\u529f\u8ab2\uff1a\u5728\u60a8\u8cfc\u8cb7\u4e8c\u624b\u88dd\u7f6e\u4e4b\u524d\uff0c\u8acb\u52d9\u5fc5\u5411\u8ce3\u5bb6\u6216\u96fb\u4fe1\u696d\u8005\u78ba\u8a8d\u8a72\u88dd\u7f6e\u672a\u88ab\u5831\u5931\u3002\u884c\u52d5\u901a\u8a0a\u7522\u696d\u5354\u6703 (Cellular Telecommunications Industry Association\uff0c\u7c21\u7a31 CTIA) \u67b6\u8a2d\u4e86\u4e00\u500b\u5c08\u9580\u7528\u4f86\u78ba\u8a8d IMEI \u7684<a href=\"https:\/\/stolenphonechecker.org\/\">\u7db2\u7ad9<\/a>\u4f86\u5354\u52a9\u6d88\u8cbb\u8005\u548c\u57f7\u6cd5\u55ae\u4f4d\u6aa2\u67e5\u67d0\u652f iPhone \u662f\u5426\u88ab\u5217\u5165\u9ed1\u540d\u55ae\u6216\u5831\u5931\u3002\u4e0d\u8ad6\u7d93\u92b7\u5546\u6216\u6d88\u8cbb\u8005\u90fd\u61c9\u8a72\u77e5\u9053\u300c\u5c0b\u627e\u6211\u7684 iPhone\u300d\u6b77\u53f2\u8cc7\u6599\u6703\u5132\u5b58\u5728 Apple \u7684\u8cc7\u6599\u5eab\u3002\u56e0\u6b64\uff0cApple \u88dd\u7f6e\u5df2\u7d93\u5177\u5099\u9632\u6b62\u88dd\u7f6e\u5931\u7aca\u4e4b\u5f8c\u88ab\u91cd\u65b0\u8ca9\u8ce3\u7684\u6a5f\u5236\uff0c\u4f8b\u5982\u53ef\u4ee5\u8b93\u88dd\u7f6e\u8b8a\u5f97\u5b8c\u5168\u7121\u6cd5\u4f7f\u7528\u3002<\/p>\n<p><strong><em>\u8da8\u52e2\u79d1\u6280\u89e3\u6c7a\u65b9\u6848<\/em><\/strong><br \/>\n\u6b64\u5916\uff0c\u63a1\u7528\u4e00\u5957\u591a\u5c64\u5f0f\u884c\u52d5\u8cc7\u5b89\u9632\u8b77\u5c0d\u4f7f\u7528\u8005\u4e5f\u6709\u6240\u5e6b\u52a9\uff0c\u4f8b\u5982\uff1a<a href=\"https:\/\/t.rend.tw\/?i=NDkwMg\">\u8da8\u52e2\u79d1\u6280\u884c\u52d5\u5b89\u5168\u9632\u8b77<\/a>\u53ef\u76e3\u63a7\u53ca\u6514\u622a\u7db2\u8def\u91e3\u9b5a\u653b\u64ca\u8207\u5176\u4ed6\u60e1\u610f\u7db2\u5740\u3002<\/p>\n<p>\u81f3\u65bc\u4f01\u696d\uff0c\u5c24\u5176\u662f\u63a1\u7528 BYOD \u88dd\u7f6e\u7684\u4f01\u696d\uff0c<a href=\"https:\/\/www.trendmicro.com\/us\/enterprise\/product-security\/mobile-security\/\">\u8da8\u52e2\u79d1\u6280\u4f01\u696d\u7248\u884c\u52d5\u5b89\u5168\u9632\u8b77<\/a>\u63d0\u4f9b\u4e86\u88dd\u7f6e\u3001\u6cd5\u898f\u9075\u5faa\u8207\u61c9\u7528\u7a0b\u5f0f\u7684\u7ba1\u7406\uff0c\u4ee5\u53ca\u8cc7\u6599\u9632\u8b77\u548c\u7d44\u614b\u914d\u7f6e\uff0c\u4e26\u53ef\u9632\u6b62\u88dd\u7f6e\u906d\u5230\u6f0f\u6d1e\u653b\u64ca\uff0c\u907f\u514d\u5b58\u53d6\u672a\u7d93\u6388\u6b0a\u7684\u61c9\u7528\u7a0b\u5f0f\uff0c\u9084\u6709\u5075\u6e2c\u4e26\u6514\u622a\u60e1\u610f\u7a0b\u5f0f\u548c\u8a50\u9a19\u7db2\u7ad9\u3002<\/p>\n<p>\u8da8\u52e2\u79d1\u6280\u7684<a href=\"https:\/\/mars.trendmicro.com\/\">\u884c\u52d5\u61c9\u7528\u7a0b\u5f0f\u4fe1\u8b7d\u8a55\u7b49\u670d\u52d9 (MARS)<\/a>\u00a0\u5df2\u7d93\u53ef\u5229\u7528\u5148\u9032\u7684\u6c99\u76d2\u6a21\u64ec\u5206\u6790\u8207\u6a5f\u5668\u5b78\u7fd2\u6280\u8853\u4f86\u9632\u7bc4 iOS \u7684\u5a01\u8105\uff0c\u9632\u6b62\u4f7f\u7528\u8005\u906d\u5230\u60e1\u610f\u7a0b\u5f0f\u3001\u96f6\u6642\u5dee\u6f0f\u6d1e\u3001\u5df2\u77e5\u6f0f\u6d1e\u3001\u96b1\u79c1\u5916\u6d29\u3001\u61c9\u7528\u7a0b\u5f0f\u6f0f\u6d1e\u7b49\u5371\u5bb3\u3002<\/p>\n<p>\u6211\u5011\u5df2\u5c07\u524d\u8ff0\u8a50\u9a19\u624b\u6cd5\u8207\u76f8\u95dc\u7814\u7a76\u767c\u73fe\u901a\u5831\u7d66 Apple\u3002\u5982\u9700\u8a73\u7d30\u7684\u7814\u7a76\u5167\u5bb9\uff0c\u5305\u62ec\u72af\u7f6a\u5de5\u5177\u7684\u8a73\u7d30\u8aaa\u660e\u4ee5\u53ca\u5165\u4fb5\u6307\u6a19\uff0c\u8acb\u53c3\u95b1\u9019\u4efd<a href=\"https:\/\/documents.trendmicro.com\/assets\/pdf\/tech-brief-physical-theft-meets-cybercrime.pdf\">\u6280\u8853\u6458\u8981<\/a>\u3002<\/p>\n<p>&nbsp;<\/p>\n<p>\u539f\u6587\u51fa\u8655\uff1a<a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/physical-theft-meets-cybercrime-illicit-business-selling-stolen-apple-devices\/\">Physical Theft Meets Cybercrime: The Illicit Business of Selling Stolen Apple Devices<\/a><\/p>\n<p>\u4f5c\u8005\uff1aFernando Merc\u00eas \u548c Mayra Rosario Fuentes<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u7d50\u5408\u771f\u5be6\u4e16\u754c\u7684\u7db2\u8def\u72af\u7f6a,\u7aca\u8cca\u5148\u89e3\u9396Apple \u88dd\u7f6e,\u518d\u92b7\u8d13\u8f49\u8ce3 \u7db2\u8def\u8a50\u9a19\u8207\u771f\u5be6\u4e16\u754c\u72af\u7f6a\u5df2\u7d93\u958b\u59cb\u51fa\u73fe\u4ea4\u96c6\u3002\u6839\u64da\u8da8 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":12819,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[2428,118,906,97,15],"tags":[2289,90,3582],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/53400"}],"collection":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=53400"}],"version-history":[{"count":0,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/53400\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=\/wp\/v2\/media\/12819"}],"wp:attachment":[{"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=53400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=53400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.trendmicro.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=53400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}