Saturday, March 8, 2025
HomeCyber Security NewsBug in Apple Store Allowed more than 500 iPhones For Just 0.03...

Bug in Apple Store Allowed more than 500 iPhones For Just 0.03 USD

Published on

SIEM as a Service

Follow Us on Google News

A Taiwanese IT engineer named Chang Chi-yuan uncovered a bug in the Apple’s payment system that allowed him to buy more than 500 iPhones for a Taiwanese dollar which is equivalent to 0.03 USD.

He posted screenshots on Facebook indicating that he successfully paid a Taiwanese dollar for 500 iPhone 8 Plus 256 GB and for two Phone XS Max 512 GB which worth 540,354.47 USD.

500 iPhones

The Apple iPhone 8 Plus was launched in September 2017, it is powered by the hexa-core processor and comes with a display resolution of 1080 pixels by 1920 pixels.

Anyhow once the transaction was accepted Chang Chi-yuan managed to cancel the purchase, Change already purchased iPhones cheaper than the original cost in 2016, he says the bug is similar to the one and it was not yet fixed. reported Taiwannews.

Chang gets attention in 2013 when he deleted a series of Facebook posts by Facebook founder Mark Zuckerberg to highlight a bug he found, after being ignored by tech support.

Few months before a new vulnerability “iOS Trustjacking” identified discovered in the iOS device that allows an attacker to control the Vulnerable device remotely and perform various malicious activities. Another researcher proved that the iPhones and iPads4/6 digits PIN’s can be bypassed with a brute force attack.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

10 Best Penetration Testing Companies in 2025

Penetration testing companies play a vital role in strengthening the cybersecurity defenses of organizations...

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...