Chinese Student Found Guilty of Scamming Apple for $900,000

Last month, it was reported that an Oregon-based Chinese student has been accused of scamming Apple by returning nearly 1,500 fake iPhones ^( and claiming they were real but broken, to get new replacement iPhones in return. Today, Quan Jiang, 30, has pleaded guilty in federal court to trafficking in counterfeit goods (via Bloomberg ^(

Fake iphone

Homeland Security Investigations Special Agent Thomas Duffy noted in a court document that Jiang exploited a vulnerability in the system that resulted in a loss of almost $900,000 for the Cupertino company.

“Submission of an iPhone that will not power on is critical to perpetuating iPhone warranty fraud, as the phone will not be able to be immediately examined or repaired by Apple technicians, triggering the Apple iPhone replacement process as part of its product warranty policy,” Duffy wrote, quoting Apple brand protection representative Adrian Punderson.

The U.S. Attorney’s office in Portland revealed that the genuine replacement phones Jiang received would be sold in China. Jiang’s associate would pay Jiang’s mother, who lives in China, who then deposited the money into Jiang’s bank account. 

Jiang is now facing a maximum sentence of 10 years in prison, a $2 million fine or twice his proceeds, whichever is greater, when he is sentenced on Aug. 28. At the same time, Jiang must also forfeit his black 2018 Mercedes-Benz CLA 250 coupe.

Russian Antivirus Company Dr.Web Found New Malware Targeting MacOS

Specialists of the Russian corporate Dr Web discovered malicious device that threatens the MacOS running gadget, which permits attackers to obtain and execute any Python code at the consumer’s software. In addition, websites distributing this malware additionally inflamed Windows customers with a deadly spy ware Trojan.

According to the workers of the corporate Dr Web, a brand new danger was once came upon via their professionals on April 29. This malware is named Mac.BackDoor.Siggen.20 and it is BackDoor that lets you obtain malicious code from a faraway server and execute it.

According to professionals, the attackers will be capable to achieve unauthorized faraway get entry to to the pc gadget. They defined that it runs within the background and is hidden from the consumer. It is claimed that it’s tricky to hit upon this malware.

Mac.BackDoor.Siggen.20 will get to units via websites owned via its builders. One such useful resource is designed as a trade card website online with a portfolio of a non-existent particular person, and the second one is disguised as a web page with the WhatsApp software.

The Press Service of the corporate mentioned that BackDoor or Trojan is loaded at the software relying at the running gadget. If a customer makes use of Mac OS, his software is inflamed with Mac.BackDoor.Siggen.20, and BackDoor.Wirenet.517 (NetWire) is loaded on Windows units. NetWire is a long-known RAT Trojan in which hackers can remotely regulate the sufferer’s laptop, together with the usage of a digicam and microphone at the software. In addition, the allotted RAT Trojan has a legitimate virtual signature.

According to internet experts, about 300 guests with distinctive IP addresses opened the website online distributing Mac.BackDoor.Siggen.20 beneath the guise of Whatsapp software. The bad useful resource works since April 29 and has no longer but been utilized by hackers in large-scale campaigns. Nevertheless, programmers counsel updating the antivirus in time, to not open suspicious trade playing cards and distributing.