For years, the theft of a modern iPhone was often a low-reward venture for criminals. Thanks to Apple’s robust Activation Lock, a stolen device without the owner’s credentials is essentially a “brick”—useless for anything other than selling for cheap replacement parts. However, a sophisticated underground economy has emerged to break this deadlock, with thieves now unlocking stolen iPhones via Telegram tools that leverage social engineering rather than complex hacking.
Security researchers have identified a growing trend of affordable “unlocking kits” sold through encrypted Telegram channels. These tools do not magically break Apple’s encryption; instead, they provide the infrastructure for thieves to trick the original owners into handing over their Apple ID and password. By utilizing services marketed as “FMI OFF” (Find My iPhone Off) and “iCloud Webkit,” criminals can remotely disable security features, turning a tracked, locked device into a high-value asset ready for resale on the secondary market.
The shift toward these digital kits marks a transition from hardware-based theft to a hybrid model of theft and cybercrime. As a former software engineer, I have seen how security is often a race between the developer and the exploiter. In this case, the exploit isn’t a flaw in the iOS code, but a flaw in human psychology, scaled through cheap, accessible software.
The Mechanics of the ‘FMI OFF’ Ecosystem
The tools being traded on Telegram are primarily phishing and smishing (SMS phishing) kits. The “iCloud Webkit” service, for instance, allows a thief to deploy a pixel-perfect replica of the Apple iCloud login page. Once a thief has a stolen device, they don’t try to guess the passcode; they target the owner’s emotions.
The process typically follows a calculated sequence of events:
- The Theft: The device is stolen via snatch-and-grab or pickpocketing.
- The Lure: The thief uses the “iCloud Webkit” to send a spoofed text message or email to the victim. These messages often claim that the “lost” iPhone has been found and provide a link to “view its location.”
- The Harvest: The victim, desperate to recover their phone, clicks the link and enters their Apple ID and password into the fake login portal.
- The Unlock: The thief captures these credentials in real-time and uses them to log into the actual iCloud account to disable Activation Lock and the “Find My” network.
Once the “FMI OFF” status is achieved, the device is completely wiped and can be sold as a “clean” phone. This process removes the primary deterrent against iPhone theft, as the device no longer alerts the owner of its location and can be activated with a new account.
Why Telegram Has Become the Hub
Telegram’s combination of encryption, large group capacities, and lax moderation makes it an ideal marketplace for these kits. Unlike more regulated app stores or even some dark-web forums, Telegram allows for the rapid dissemination of “services” with minimal friction. Sellers often post testimonials, screenshots of “successful unlocks,” and tiered pricing based on the iOS version or device model.
These kits are often sold as subscriptions or one-time purchases, making them accessible even to low-level street criminals. The democratization of these tools means that a thief no longer needs deep technical knowledge to bypass Apple’s security; they only need a few dollars and the ability to follow a tutorial provided by a Telegram vendor.
Comparing Bypass Methods
It is important to distinguish between different types of “unlocking” claims seen in these channels, as many are fraudulent or limited in scope.
| Method | Mechanism | Effectiveness | Risk to User |
|---|---|---|---|
| Phishing Kits | Social engineering via fake links | High (if victim complies) | Total account compromise |
| Hardware Bypass | Exploiting bootrom vulnerabilities | Low (mostly older models) | Device instability |
| IMEI Unlocking | Database manipulation (claimed) | Very Low / Mostly Scams | Financial loss to scammer |
The Limitations of Current Defenses
Apple has implemented several layers of security to combat this, most notably two-factor authentication (2FA). When a thief attempts to log in with stolen credentials, a code is sent to the user’s other trusted devices. However, the phishing kits are evolving. Many now include “real-time” proxies that prompt the victim for the 2FA code immediately after they enter their password, which the thief then enters into the legitimate Apple site within seconds.
This “man-in-the-middle” attack renders traditional 2FA less effective because the user believes they are authorizing their own login to find their stolen phone. The psychological urgency of the situation—the fear of losing an expensive device and personal data—often overrides the caution users typically exercise with security codes.
How to Protect Your Device and Data
While the “iCloud Webkit” tools are effective, they rely entirely on the victim’s cooperation. To mitigate the risk of having a stolen iPhone unlocked, users should adhere to strict digital hygiene:

- Ignore “Found” Messages: Apple will never send you a text message with a link asking you to log in to find your device. Use the official Find My website or app on another trusted Apple device.
- Avoid Clicking Links: If you receive a notification that your phone has been located, treat it as a phishing attempt. Do not enter your credentials into any site reached via a text message.
- Use Strong, Unique Passwords: Ensure your Apple ID password is not reused across other accounts, which prevents “credential stuffing” if other services are breached.
- Report Immediately: Mark your device as lost in the Find My app immediately. This puts the device in a restricted mode that makes it harder for thieves to interact with.
For those whose devices have already been stolen, the most critical step is to resist the urge to interact with any messages claiming the phone has been found. Engaging with these messages is the only way the “FMI OFF” tools can function.
As these Telegram-based services continue to evolve, the security community expects further updates to iOS that may tighten the integration between the “Lost Mode” status and the ability to change account credentials. The next significant checkpoint for users will be the rollout of future iOS security patches, which typically address the ways in which system-level locks are interacted with remotely.
Do you have experience with these types of phishing attempts, or have you found a more effective way to secure your devices? Share your thoughts and experiences in the comments below.
