{"id":5115,"date":"2025-04-03T09:22:29","date_gmt":"2025-04-03T09:22:29","guid":{"rendered":"https:\/\/www.ripandscam.com\/blog\/?p=5115"},"modified":"2025-04-03T09:22:31","modified_gmt":"2025-04-03T09:22:31","slug":"scam-messages-iphone-farms-flooding-imessage-with-over-100000-daily","status":"publish","type":"post","link":"https:\/\/www.ripandscam.com\/blog\/phone-scam\/scam-messages-iphone-farms-flooding-imessage-with-over-100000-daily\/","title":{"rendered":"Scam Messages iPhone Farms Flooding iMessage with Over 100,000 Daily"},"content":{"rendered":"\n<p>Security researchers have uncovered a large-scale scam operation where iPhone farms\u2014racks of devices using temporary Apple IDs\u2014are being used to send over 100,000 fraudulent iMessages per day. Unlike traditional text-based scams, iMessages bypass mobile carrier filters designed to block fraudulent messages, making them harder to detect. Scammers commonly use these messages to distribute phishing attacks disguised as fake unpaid toll fees, bogus shipping charges, and fraudulent tax warnings that threaten legal action. Researchers at cybersecurity firm Catalyst found that scammers prefer iMessage because its end-to-end encryption prevents mobile carriers from screening messages for suspicious content. What\u2019s more alarming is that a Chinese platform is offering access to iPhone farms as a paid service, allowing criminals to send thousands of scam messages without any technical expertise. As authorities work to combat this growing threat, users are urged to remain cautious, avoid clicking suspicious links, and never share personal information in response to unexpected messages.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have uncovered a large-scale scam operation where iPhone farms\u2014racks of devices using temporary Apple IDs\u2014are being used to send over 100,000 fraudulent iMessages per day. Unlike traditional text-based scams, iMessages bypass mobile carrier filters designed to block fraudulent messages, making them harder to detect. Scammers commonly use these messages to distribute phishing attacks [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5116,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,15,115],"tags":[108,43,47,230],"class_list":["post-5115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-phone-scam","category-scam","category-scammer","tag-phone-scam","tag-scammers","tag-scams","tag-text-scam"],"_links":{"self":[{"href":"https:\/\/www.ripandscam.com\/blog\/wp-json\/wp\/v2\/posts\/5115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ripandscam.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ripandscam.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ripandscam.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ripandscam.com\/blog\/wp-json\/wp\/v2\/comments?post=5115"}],"version-history":[{"count":1,"href":"https:\/\/www.ripandscam.com\/blog\/wp-json\/wp\/v2\/posts\/5115\/revisions"}],"predecessor-version":[{"id":5117,"href":"https:\/\/www.ripandscam.com\/blog\/wp-json\/wp\/v2\/posts\/5115\/revisions\/5117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ripandscam.com\/blog\/wp-json\/wp\/v2\/media\/5116"}],"wp:attachment":[{"href":"https:\/\/www.ripandscam.com\/blog\/wp-json\/wp\/v2\/media?parent=5115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ripandscam.com\/blog\/wp-json\/wp\/v2\/categories?post=5115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ripandscam.com\/blog\/wp-json\/wp\/v2\/tags?post=5115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}