← Back to stories Close-up of hand unlocking a smartphone next to a cup of tea on a wooden table, emphasizing technology and security.
Photo by Jakub Zerdzicki on Pexels
凤凰科技 2026-04-16

Non-iPhone Issue: Demonstration of Locked iPhone Being Fraudulently Charged $10,000, Visa Responds That Conditions for Exploit Are Stringent

A viral claim and a troubling demo

It has been reported that a viral demonstration circulated on Chinese social media showing a locked iPhone being charged roughly $10,000 (USD) without the device owner’s consent. The clip sparked immediate alarm online: how can a locked phone be used to authorize such a large contactless payment? Reportedly, the video shows a merchant terminal or third‑party device initiating a high‑value transaction while the target phone remained locked, suggesting an apparent bypass of expected payment protections.

Visa pushes back, experts urge caution

Visa responded that the conditions necessary for the alleged exploit are “stringent,” and that the payment network’s tokenization and issuer‑level fraud controls make large‑value, unauthorised contactless charges difficult in normal circumstances. Security researchers cautioned that staged demonstrations can be misleading — a controlled environment, special hardware, or pre‑existing compromises (for example, compromised merchant terminals, cloned tokens, or sophisticated malware) can produce results that would not generalise to ordinary consumers or retail settings.

What this means for Chinese and global users

For readers unfamiliar with China’s payments landscape: mobile contactless payments are ubiquitous here, alongside foreign systems such as Visa and Mastercard. That ubiquity raises stakes when a payment vulnerability is suggested. Card networks, banks and device vendors typically rely on layered protections — device locking, biometric prompts, tokenisation, and issuer velocity checks — to prevent fraud. Still, even rare attack scenarios drive public concern and regulatory attention.

Broader implications and the next steps

Reportedly, regulators and industry bodies are watching the clip; investigators will need access to the original hardware and transaction logs to verify claims. Could this be a real exploitable flaw, or a clever demo built on special conditions? Either way, the episode underscores persistent tensions around payment security, supply‑chain trust and device integrity — concerns amplified by broader geopolitical friction over tech supply and standards. Consumers should monitor issuer alerts, enable strong device locks and report suspicious transactions promptly.

SmartphonesSpace
View original source →