Security vulnerability in Apple ID / iCloud Mail allowing account lockout attacks!
Dear Apple Security Team,
I would like to report a security vulnerability in the Apple ID ecosystem that is currently being abused by scammers to blackmail users and permanently lock them out of their accounts. Unfortunately, I personally became a victim of this issue.
The problem is related to access to iCloud Mail and the primary @icloud.com alias of an Apple ID account.
An attacker who only has the Apple ID login and password (without knowing the security questions or date of birth) can gain access to https://www.icloud.com/mail/. From there, they are able to view or create an iCloud mail alias and identify the primary @icloud.com address linked to the account.
Using this primary alias, attackers can perform repeated automated login attempts to Apple ID services, intentionally triggering security lockouts. Because the primary @icloud.com alias cannot be removed or changed, the account becomes effectively unusable for the legitimate owner.
Changing the main email (@gmail.com etc) does not resolve the problem, since the lockouts are tied to the immutable primary alias @icloud.com
As a result:
• Apple IDs can be permanently locked
• Legitimate owners lose access
• This method is being used for extortion
• Recovery becomes extremely difficult or impossible
I believe this is a security design flaw and could be mitigated by implementing one or more of the following measures:
Require additional Apple ID verification (for example, security questions or equivalent account-level verification) when accessing iCloud Mail via https://www.icloud.com/mail/.
Allow users to change or regenerate their primary @icloud.com alias in cases of abuse or compromise.
These changes would significantly reduce the risk of account destruction and mass harassment attacks.
I am ready to provide more technical details and real-world evidence of this method if required.
Please contact me so I can share further information privately.
iPhone 17 Pro Max, iOS 26