Friday, February 14, 2025
HomeCyber Security NewsBug in Apple Store Allowed more than 500 iPhones For Just 0.03...

Bug in Apple Store Allowed more than 500 iPhones For Just 0.03 USD

Published on

SIEM as a Service

Follow Us on Google News

A Taiwanese IT engineer named Chang Chi-yuan uncovered a bug in the Apple’s payment system that allowed him to buy more than 500 iPhones for a Taiwanese dollar which is equivalent to 0.03 USD.

He posted screenshots on Facebook indicating that he successfully paid a Taiwanese dollar for 500 iPhone 8 Plus 256 GB and for two Phone XS Max 512 GB which worth 540,354.47 USD.

500 iPhones

The Apple iPhone 8 Plus was launched in September 2017, it is powered by the hexa-core processor and comes with a display resolution of 1080 pixels by 1920 pixels.

Anyhow once the transaction was accepted Chang Chi-yuan managed to cancel the purchase, Change already purchased iPhones cheaper than the original cost in 2016, he says the bug is similar to the one and it was not yet fixed. reported Taiwannews.

Chang gets attention in 2013 when he deleted a series of Facebook posts by Facebook founder Mark Zuckerberg to highlight a bug he found, after being ignored by tech support.

Few months before a new vulnerability “iOS Trustjacking” identified discovered in the iOS device that allows an attacker to control the Vulnerable device remotely and perform various malicious activities. Another researcher proved that the iPhones and iPads4/6 digits PIN’s can be bypassed with a brute force attack.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...

BadPilot Attacking Network Devices to Expand Russian Seashell Blizzard’s Attacks

A newly uncovered cyber campaign, dubbed "BadPilot," has been linked to a subgroup of...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A newly discovered vulnerability in Microsoft Windows, identified by ClearSky Cyber Security, is reportedly...

Burp Suite Professional / Community 2025.2 Released With New Built-in AI Integration

PortSwigger has announced the release of Burp Suite Professional and Community Edition 2025.2, introducing...

Arbitrary File Upload Vulnerability in WordPress Plugin Let Attackers Hack 30,000 Website

A subgroup of the Russian state-sponsored hacking group Seashell Blizzard, also known as Sandworm,...