{"id":7364,"date":"2015-02-04T10:00:45","date_gmt":"2015-02-04T15:00:45","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=7364"},"modified":"2019-11-15T07:08:07","modified_gmt":"2019-11-15T12:08:07","slug":"used-apple-devices-fraud","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/used-apple-devices-fraud\/7364\/","title":{"rendered":"How to Tweak Fraudsters&#8217; Noses When Buying Second-Hand iPhones"},"content":{"rendered":"<p>The\u00a0consumer-to-consumer sales market is a great field for frauds of all stripes. Many people buy smartphones and other gadgets on online auction and shopping platforms such as eBay.<\/p>\n<p>Thousands of gadgets are bought and sold at such sites,\u00a0including popular Apple devices. There are many ways to fool a victim who is going to buy\/sell a phone from\/to a third-party seller\/buyer. In this post, we speak about the most popular ones.<\/p>\n<h3>1. Too low a price and advanced payment<\/h3>\n<p>Be careful when people offer you goods at a very low price and with an obligatory advanced payment. Sellers will have many\u00a0convincing arguments (need of money ASAP, two similar devices were given as gifts, etc) \u2013 you can come away with a used device instead of brand new one, a broken device, or nothing at all. An advanced payment in the majority of cases is a no-no. The only exception is when you buy a device from a trusted salesman \u2014 an eBay account must have a good rating given by hundreds of users.<\/p>\n<h3>2. Broken devices and phones made of wax and paper<\/h3>\n<p>Even local stores and online shops can deceive you. Many fraudsters sell broken devices to stores with an excuse as to why it can\u2019t be checked immediately: They may say that the\u00a0battery is low and you need to charge it before turning on your device. These people are experienced and convincing.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Mobile couple faces total of 38 fraud charges, man accused of packaging melted wax as iPhone. <a href=\"http:\/\/t.co\/26tt9t4kVG\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/26tt9t4kVG<\/a> <a href=\"http:\/\/t.co\/Tgoi3TZ2wC\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/Tgoi3TZ2wC<\/a><\/p>\n<p>\u2014 AL.com Mobile (@ALcomMobile) <a href=\"https:\/\/twitter.com\/ALcomMobile\/status\/550324761608589312?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 31, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>When victims get home, they open the box and face an unpleasant surprise. <a href=\"https:\/\/www.al.com\/news\/mobile\/index.ssf\/2014\/12\/mobile_couple_faces_a_total_of.html?hootPostID=50da151450338072bc22638ef3a1dde1\" target=\"_blank\" rel=\"noopener nofollow\">A similar situation happened<\/a> to a man who bought an iPad Mini and iPhone 4S after responding to a Craigslist ad. The seller brought the devices, took the money, and ran away before anyone managed to stop him. Instead of Apple devices the boxes contained a brick of melted wax and a paper notebook.<\/p>\n<h3>3. iPhone with Chinese roots\u2026 and Android OS<\/h3>\n<p>Many people wittingly buy fake iPhones from Chinese manufacturers just because they are cheap. That\u2019s their choice. But sometimes these forgeries are sold as original devices. Some of them look just like real ones. For instance, in this video, you can see a fake iPhone sold under Goophone brand. Would you be able to tell it\u2019s a fake?<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/95tWZZi2tJY?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>There\u2019s one simple trick to detect the fake device. As fake iPhones run under the control of Android OS all you need to do is to turn it on and see which store it supports: Google Play (a forgery) or App Store (a real iPhone).<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">During the <a href=\"https:\/\/twitter.com\/hashtag\/Christmas?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Christmas<\/a> season, please be aware of what you buy online. This is a fake <a href=\"https:\/\/twitter.com\/hashtag\/iPhone?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#iPhone<\/a> <a href=\"http:\/\/t.co\/7pg74qgAen\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/7pg74qgAen<\/a>  <a href=\"https:\/\/twitter.com\/hashtag\/kijiji?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#kijiji<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/craigslist?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#craigslist<\/a><\/p>\n<p>\u2014 Cst. McCarthy @ TPS (@OfficerMcCarthy) <a href=\"https:\/\/twitter.com\/OfficerMcCarthy\/status\/538043368702742528?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">November 27, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>4. Stolen devices<\/h3>\n<p>If you are going to buy a second-hand iPhone there is a good chance you\u2019re being offered a stolen device. There is no way to say to know for sure; that\u2019s why you need to look for\u00a0indirect signs. Be sure to check the seller\u2019s profile and reviews from other customers. Look through other ads posted from the seller\u2019s account. When you check the device itself, compare the code, serial number and IMEI from the box with the information given in the device settings.<\/p>\n<p>https:\/\/twitter.com\/MrBastounis\/status\/134763327598497792<\/p>\n<h3>5. Refurbished devices<\/h3>\n<p>Buying a factory refurbished iPhone can save you some extra money as the original manufacturer inspects the inside and outside of the device and cautiously corrects any problems. The quality of device repair can be lower if a third-party company restores it.<\/p>\n<h3>6. Remote lock and blackmail<\/h3>\n<p>Beware of miscreants! There were cases when people bought a second-hand device and then found it locked with the Find iPhone options (only for iOS 6 and later). After that, the villains would blackmail their victims: e.g., tell them they have their\u00a0stolen phone and threaten to go to police. To make the device work again you can reset settings to default before buying.<\/p>\n<p>And if you sell your used iPhone, make sure you\u2019ve wiped it. Otherwise be prepared to face unpleasant consequences especially if you have important information on the device\u2019s memory card. In this case, you should try to lock the phone remotely.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Brit's iPhone stolen on holiday..now thief threatens to leak sex snaps of owner's girlfriend if he isn't paid \u00a31,600: <a href=\"http:\/\/t.co\/oh1rRumrWR\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/oh1rRumrWR<\/a><\/p>\n<p>\u2014 The Scottish Sun (@ScottishSun) <a href=\"https:\/\/twitter.com\/ScottishSun\/status\/513752087222444033?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 21, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>7. Fake shops and unfair sellers\/buyers<\/h3>\n<p>Sometimes hackers create day-fly websites that are actually fake online shops to gather information about credit cards and other sensitive data. Someone trying to sell an iPhone can become a victim: a \u2018consumer\u2019 requests detailed banking information, allegedly for a money transfer. This data can also be used to steal money from your credit card.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">I can\u2019t sell my iPhone 5. Everyone who tries is either too stupid to live or is trying to commit fraud. <a href=\"http:\/\/t.co\/CaRbvibXqf\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/CaRbvibXqf<\/a><\/p>\n<p>\u2014 Aaron Vegh (@aaronvegh) <a href=\"https:\/\/twitter.com\/aaronvegh\/status\/518444946236637185?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">October 4, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h3>8. Robbery, counterfeit notes, cheating and other old-fashion frauds<\/h3>\n<p>If you are buying a secondhand iPhone from a local seller, arrange a meeting at a public place with free Wi-Fi to protect yourself from robbery and check on-site if the device works properly.<\/p>\n<p>If you are paying cash, try to pay with the exact amount of money. This is good for the seller and you, and it protects you from being given counterfeit notes in change. Do not agree to exchange money to smaller denominations. Be vigilant and don\u2019t be shy about\u00a0recounting your money or checking the device twice.<\/p>\n<p>Of course all of this advice works well for any buying\u00a0or selling of gadgets. Apple devices are a little bit more attractive to fraudsters; that\u2019s the reason we used them as an example.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether you&#8217;re buying or selling a secondhand Apple device, you can be fooled by criminals. We have gathered tips on how to minimize your chances of being taken by such frauds.<\/p>\n","protected":false},"author":40,"featured_media":7379,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,9],"tags":[14,264,80,100,26,423,192,97,131,938],"class_list":{"0":"post-7364","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-tips","9":"tag-apple","10":"tag-device-security","11":"tag-fraud","12":"tag-ipad","13":"tag-iphone","14":"tag-mobile-devices","15":"tag-protection","16":"tag-security-2","17":"tag-tips","18":"tag-used-devices"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/used-apple-devices-fraud\/7364\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/used-apple-devices-fraud\/4588\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/used-apple-devices-fraud\/4535\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/used-apple-devices-fraud\/5099\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/used-apple-devices-fraud\/6577\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/used-apple-devices-fraud\/6746\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/used-apple-devices-fraud\/6577\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/used-apple-devices-fraud\/7364\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/used-apple-devices-fraud\/7364\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tips\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/7364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=7364"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/7364\/revisions"}],"predecessor-version":[{"id":30580,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/7364\/revisions\/30580"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/7379"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=7364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=7364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=7364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}