{"id":26920,"date":"2014-05-27T09:50:15","date_gmt":"2014-05-27T16:50:15","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=26920"},"modified":"2014-05-28T00:36:03","modified_gmt":"2014-05-28T07:36:03","slug":"oleg-pliss-hack","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/","title":{"rendered":"Have you been hacked by Oleg Pliss? FAQ for iPhone and iPad users"},"content":{"rendered":"<p>iPhone, iPad and Mac users in Australia and New Zealand (and <a title=\"Link to Softpedia article\" href=\"http:\/\/news.softpedia.com\/news\/Oleg-Pliss-Hack-Spreads-to-US-and-UK-Change-Your-Passwords-Now-444009.shtml\" target=\"_blank\" rel=\"nofollow\">possibly<\/a> elsewhere in the world) have been seeing a very strange message appear, demanding that they pay a ransom to regain access to their devices.<\/p>\n<p>Here are answers to some of the questions.<\/p>\n<p><strong>What has happened?<\/strong><br \/>\nFor the last day or so, Antipodean Apple fans have been posting on the <a title=\"Link to Apple support forum\" href=\"https:\/\/discussions.apple.com\/thread\/6270410?start=0&amp;tstart=0\" target=\"_blank\" rel=\"nofollow\">company&#8217;s support forum<\/a>, asking how they can restore access to their iPhones, iPads and iMacs after a mysterious message appeared demanding a ransom be paid.<\/p>\n<p><strong>What did the message look like?<\/strong><br \/>\nPart of the message was included in this photograph taken by the Sydney Morning Herald in its <a title=\"Link to Sydney Morning Herald\" href=\"http:\/\/www.smh.com.au\/digital-life\/consumer-security\/australian-apple-idevices-hijacked-held-to-ransom-20140527-zrpbj.html\" target=\"_blank\" rel=\"nofollow\">report<\/a>.<\/p>\n<div id=\"attachment_26923\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-26923\" loading=\"lazy\" class=\"size-full wp-image-26923\" alt=\"Locked iMac. Image source: Sydney Morning Herald\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/oleg-pliss.jpeg\" width=\"600\" height=\"335\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/oleg-pliss.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/oleg-pliss-150x83.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/oleg-pliss-300x167.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><p id=\"caption-attachment-26923\" class=\"wp-caption-text\">Locked iMac. Image source: Sydney Morning Herald<\/p><\/div>\n<blockquote><p>&#8220;Hacked by Oleg Pliss. For unlock device YOU NEED send voucher code by 100 $\/eur one of this(Moneypack\/Ukash\/PaySafeCard)to [email address]&#8221;<\/p><\/blockquote>\n<p><strong>How would you know if you were a victim?<\/strong><br \/>\nYou would no longer be able to access your iPhone, iPad or iMac as it would be locked by the same &#8220;Find my iPhone&#8221; technology that you can use if you mislay or have your device stolen.<\/p>\n<p>Some victims reported that the message suddenly appeared on their devices in the middle of the night.<\/p>\n<blockquote class=\"twitter-tweet\" width=\"500\">\n<p>Woken up at 2am by hacked &#39;Find My iPhone&#39; asking for money, no sleeping after trying to sort that out so at work at 6am: Today will be fun.<\/p>\n<p>&mdash; Casey Maree (@_caseymaree_) <a href=\"https:\/\/twitter.com\/_caseymaree_\/statuses\/471026601514119168\">May 26, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<strong>How did the attackers manage to lock other people&#8217;s devices?<\/strong><br \/>\nThere are a few possibilities.<\/p>\n<ul>\n<li>It could be that the attackers have exploited a vulnerability to access Apple users&#8217; accounts to trigger the &#8220;Lost iDevice&#8221; process, but that doesn&#8217;t explain why the vast majority of reports come from Australia and New Zealand.<\/li>\n<li>It could be that the attackers broke into Apple&#8217;s systems and stole a database of usernames and passwords. But that wouldn&#8217;t explain why the majority of reports involve users in Australia and New Zealand.<\/li>\n<li>It could be that the victims all chose really dumb Apple ID passwords, that were easy for the attackers to crack. But dumb password choices are not exclusively a challenge for Australian and New Zealand users.<\/li>\n<li>It could be that the devices have been infected by malware &#8211; but that seems highly unlikely &#8211; especially as many affected devices aren&#8217;t jailbroken, and again wouldn&#8217;t explain why the vast majority of reports come from Australia and New Zealand.<\/li>\n<li>It could be that the victims were all duped by a phishing campaign into handing over their Apple ID credentials &#8211; but it would have had to have been a very localised campaign to be so skewed towards Australian and New Zealand users.<\/li>\n<li>It could be that another service &#8211; perhaps popular in Australia and New Zealand &#8211; has been hacked, revealing shared passwords that were also being used to secure Apple IDs.<\/li>\n<\/ul>\n<p><strong>Could Apple ID accounts have been better protected?<\/strong><br \/>\nAlthough the precise details of what occurred are not yet clear, what is certain is that Apple users who use <a title=\"Link to Apple support kbase article\" href=\"http:\/\/support.apple.com\/kb\/HT5570\" target=\"_blank\" rel=\"nofollow\">two-factor authentication<\/a> to protect their Apple ID accounts will be better protected from being compromised.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-26953\" alt=\"Apple 2FA\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-2fa.jpeg\" width=\"600\" height=\"195\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-2fa.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-2fa-150x48.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-2fa-300x97.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Two-factor authentication (sometimes called two step verification) makes life much harder for hackers attempting to hijack control of your accounts and devices, as it means they require more than just your username and password. They also need a one-time password (OTP) that is sent to your device itself.<\/p>\n<p>In addition, you can set up a 14-digit recovery key that you can print out and keep in safe place. Apple suggests you keep the recovery key to regain access to your account, or if you ever lose access to your devices or forget your password.<\/p>\n<p><strong>Who is Oleg Pliss?<\/strong><br \/>\nWe have no idea. But, of course, it&#8217;s extremely likely that it&#8217;s not the real name of the criminal behind this attack. (Unless they&#8217;re very dumb).<\/p>\n<p>A quick search on <a title=\"Link to Oleg Pliss\" href=\"https:\/\/www.linkedin.com\/pub\/oleg-pliss\/9\/6a6\/65a\" target=\"_blank\" rel=\"nofollow\">LinkedIn<\/a> reveals a computer scientist named Oleg Pliss. There is no reason to believe that he is behind the attack however. More likely this is mischief-making by the criminals.<\/p>\n<p><strong>How do the bad guys make money?<\/strong><br \/>\nFrom the sound of things, they are asking victims to electronically transfer money to their email address.<\/p>\n<p>A posting on the Apple Support forum says that the criminals gave a Hotmail address which they requested be sent funds via PayPal, but of course that account could belong to an innocent individual.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-26932\" alt=\"Apple Support forum\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-support-forum.jpeg\" width=\"600\" height=\"624\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-support-forum.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-support-forum-144x150.jpeg 144w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/apple-support-forum-288x300.jpeg 288w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Similarly, Oleg Pliss might be the name of someone being framed by the criminals behind the attack. If that&#8217;s the case, it&#8217;s a little pathetic. My guess is that they&#8217;ve used the name as a joke.<\/p>\n<p><strong>Well, I&#8217;m not laughing. How do I restore access to my device?<\/strong><\/p>\n<p>The most important thing is not to pay any money to the criminals. That will only encourage them to launch further attacks, and there is no guarantee that they will unlock your device.<\/p>\n<p>Instead, erase your device using Recovery Mode and restore from a backup:<\/p>\n<ol>\n<li>Disconnect all cables from your device.<\/li>\n<li>Turn off your device.<\/li>\n<li>Press and hold the Home button. While holding the Home button, connect your device to iTunes. If your device doesn&#8217;t turn on automatically, turn it on.<\/li>\n<li>Continue holding the Home button until you see the Connect to iTunes screen.<\/li>\n<li>iTunes will alert you that it has detected a device in recovery mode. Click OK, then restore the device.<\/li>\n<\/ol>\n<p>You may also find this <a title=\"Link to Apple kbase\" href=\"http:\/\/support.apple.com\/kb\/ht1212\" target=\"_blank\" rel=\"nofollow\">Apple support knowledgebase<\/a> article useful.<\/p>\n<p>Afterwards, enable <a title=\"Link to two step verification\" href=\"http:\/\/support.apple.com\/kb\/HT5570\" target=\"_blank\" rel=\"nofollow\">two-step verification<\/a> for your Apple ID (if available in your country), and ensure that you are never re-using passwords on the internet.<\/p>\n<p><strong>What else?<\/strong><br \/>\nFollow the discussion on the <a title=\"Link to Apple support forum\" href=\"https:\/\/discussions.apple.com\/thread\/6270410?start=0&amp;tstart=0\" target=\"_blank\" rel=\"nofollow\">Apple Support community forum<\/a> for updates from other affected users.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>iPhone, iPad and Mac users in Australia and New Zealand (and possibly elsewhere in the world) have been seeing a very strange message appear, demanding that they pay a ransom to regain access to their devices. Here are answers to some of the questions. What has happened? For the last day or so, Antipodean Apple [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":26977,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[679,1117,1120,1114],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"iPhone, iPad and Mac users in Australia and New Zealand (and possibly elsewhere in the world) have been seeing a very strange message appear, demanding\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Have you been hacked by Oleg Pliss? FAQ for iPhone and iPad users - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"iPhone, iPad and Mac users in Australia and New Zealand (and possibly elsewhere in the world) have been seeing a very strange message appear, demanding\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-27T16:50:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-05-28T07:36:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/pliss-featured.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/pliss-featured.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/pliss-featured.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/\",\"name\":\"Have you been hacked by Oleg Pliss? FAQ for iPhone and iPad users - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#primaryimage\"},\"datePublished\":\"2014-05-27T16:50:15+00:00\",\"dateModified\":\"2014-05-28T07:36:03+00:00\",\"description\":\"iPhone, iPad and Mac users in Australia and New Zealand (and possibly elsewhere in the world) have been seeing a very strange message appear, demanding\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Have you been hacked by Oleg Pliss? FAQ for iPhone and iPad users\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Have you been hacked by Oleg Pliss? FAQ for iPhone and iPad users\",\"datePublished\":\"2014-05-27T16:50:15+00:00\",\"dateModified\":\"2014-05-28T07:36:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#webpage\"},\"wordCount\":934,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/pliss-featured.jpeg\",\"keywords\":[\"Apple ID\",\"Find My\",\"Hack\",\"Oleg Pliss\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"iPhone, iPad and Mac users in Australia and New Zealand (and possibly elsewhere in the world) have been seeing a very strange message appear, demanding","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/","og_locale":"en_US","og_type":"article","og_title":"Have you been hacked by Oleg Pliss? FAQ for iPhone and iPad users - The Mac Security Blog","og_description":"iPhone, iPad and Mac users in Australia and New Zealand (and possibly elsewhere in the world) have been seeing a very strange message appear, demanding","og_url":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-05-27T16:50:15+00:00","article_modified_time":"2014-05-28T07:36:03+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/pliss-featured.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/pliss-featured.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/pliss-featured.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/","name":"Have you been hacked by Oleg Pliss? FAQ for iPhone and iPad users - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#primaryimage"},"datePublished":"2014-05-27T16:50:15+00:00","dateModified":"2014-05-28T07:36:03+00:00","description":"iPhone, iPad and Mac users in Australia and New Zealand (and possibly elsewhere in the world) have been seeing a very strange message appear, demanding","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Have you been hacked by Oleg Pliss? FAQ for iPhone and iPad users"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Have you been hacked by Oleg Pliss? FAQ for iPhone and iPad users","datePublished":"2014-05-27T16:50:15+00:00","dateModified":"2014-05-28T07:36:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#webpage"},"wordCount":934,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/pliss-featured.jpeg","keywords":["Apple ID","Find My","Hack","Oleg Pliss"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/oleg-pliss-hack\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/pliss-featured.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-70c","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26920"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=26920"}],"version-history":[{"count":24,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26920\/revisions"}],"predecessor-version":[{"id":27181,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26920\/revisions\/27181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/26977"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=26920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=26920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=26920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}