Tuesday, May 20, 2025
HomeCyber Security NewsBug in Apple Store Allowed more than 500 iPhones For Just 0.03...

Bug in Apple Store Allowed more than 500 iPhones For Just 0.03 USD

Published on

SIEM as a Service

Follow Us on Google News

A Taiwanese IT engineer named Chang Chi-yuan uncovered a bug in the Apple’s payment system that allowed him to buy more than 500 iPhones for a Taiwanese dollar which is equivalent to 0.03 USD.

He posted screenshots on Facebook indicating that he successfully paid a Taiwanese dollar for 500 iPhone 8 Plus 256 GB and for two Phone XS Max 512 GB which worth 540,354.47 USD.

500 iPhones

The Apple iPhone 8 Plus was launched in September 2017, it is powered by the hexa-core processor and comes with a display resolution of 1080 pixels by 1920 pixels.

- Advertisement - Google News

Anyhow once the transaction was accepted Chang Chi-yuan managed to cancel the purchase, Change already purchased iPhones cheaper than the original cost in 2016, he says the bug is similar to the one and it was not yet fixed. reported Taiwannews.

Chang gets attention in 2013 when he deleted a series of Facebook posts by Facebook founder Mark Zuckerberg to highlight a bug he found, after being ignored by tech support.

Few months before a new vulnerability “iOS Trustjacking” identified discovered in the iOS device that allows an attacker to control the Vulnerable device remotely and perform various malicious activities. Another researcher proved that the iPhones and iPads4/6 digits PIN’s can be bypassed with a brute force attack.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Cyberattack on Serviceaide Compromises Data of 480,000 Catholic Health Patients

Data breach at Serviceaide, Inc., a technology vendor for Catholic Health, exposed sensitive information...

Threat Actors Deploy Bumblebee Malware via Poisoned Bing SEO Results

A newly identified cyberattack campaign has revealed the persistent and evolving threat of Bumblebee...

Security Flaw in WordPress Plugin Puts 22,000 Websites at Risk of Cyber Attacks

Critical security vulnerability has been discovered in Motors, a popular WordPress theme with over...

Critical VMware Cloud Foundation Vulnerability Exposes Sensitive Data

Broadcom's VMware division has disclosed three significant security vulnerabilities in its Cloud Foundation platform...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cyberattack on Serviceaide Compromises Data of 480,000 Catholic Health Patients

Data breach at Serviceaide, Inc., a technology vendor for Catholic Health, exposed sensitive information...

Threat Actors Deploy Bumblebee Malware via Poisoned Bing SEO Results

A newly identified cyberattack campaign has revealed the persistent and evolving threat of Bumblebee...

Security Flaw in WordPress Plugin Puts 22,000 Websites at Risk of Cyber Attacks

Critical security vulnerability has been discovered in Motors, a popular WordPress theme with over...