Apple denies iCloud hack resulted in leaked celebrity photos

iPhone maker responds to reports an iCloud hack led to the leaking of private celebrity pictures online

Apple has dismissed claims an iCloud hack resulted in numerous private photographs of female celebrities being leaked online.

In a statement to the press, released overnight, Apple denied the leaked photographs were in the public domain because iCloud was breached. 

"After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the internet," the statement reads.

Advertisement - Article continues below

"None of the cases we have investigated has resulted from any breach in any of Apple's systems, including iCloud and Find my iPhone.

"We are continuing to work with law enforcement to help identify the criminals involved," it concluded. 

On Monday, news emerged about the publication of hundreds of private pictures belonging to female celebrities, including Hunger Games star Jennifer Lawrence and Spiderman actress Kirsten Dunst, on the Reddit and 4Chan messageboards.

The photos, it was claimed, were obtained by hackers who managed to infiltrate Apple's online backup service iCloud using a tool called iBrute.

This allows hackers to repeatedly submit potential passwords to Apple's Find My iPhone service login page until they uncover the correct one.

Once accessed, it is then possible for the hackers to access data stored in the iCloud account belonging to the breached Apple ID.

Advertisement
Advertisement - Article continues below

As reported by IT Pro yesterday, Apple has now patched the security flaw that allowed the hackers to repeatedly test passwords without being locked out.

Speaking to the Associated Press news agency, a spokesperson for the FBI said it is "aware of the allegations" and making moves to address them.

Featured Resources

Successful digital transformations are future ready - now

Research findings identify key ingredients to complete your transformation journey

Download now

Cyber security for accountants

3 ways to protect yourself and your clients online

Download now

The future of database administrators in the era of the autonomous database

Autonomous databases are here. So who needs database administrators anymore?

Download now

The IT expert’s guide to AI and content management

Your guide to the biggest opportunities for IT teams when it comes to AI and content management

Download now
Advertisement

Recommended

Visit/security/vulnerability/355276/businesses-brace-for-second-fujiwhara-effect-of-2020-as-patch-tuesday
vulnerability

Businesses brace for second 'Fujiwhara effect' of 2020 as Patch Tuesday looms

9 Apr 2020
Visit/security/cyber-security/355267/zoom-hires-ex-facebook-cso-to-boost-platform-security
cyber security

Zoom hires ex-Facebook CSO Alex Stamos to boost platform security

8 Apr 2020
Visit/security/vulnerability/355236/hp-support-assistant-flaws-leave-windows-devices-open-to-attack
vulnerability

HP Support Assistant flaws leave Windows devices open to attack

6 Apr 2020
Visit/security/cyber-security/355234/safari-bug-let-hackers-access-cameras-on-iphones-and-macs
cyber security

Safari bug let hackers access cameras on iPhones and Macs

6 Apr 2020

Most Popular

Visit/software/video-conferencing/355257/taiwan-first-country-to-ban-zoom-amid-security-concerns
video conferencing

Taiwan becomes first country to ban Zoom amid security concerns

8 Apr 2020
Visit/mobile/mobile-phones/355239/microsofts-patent-design-reveals-a-mobile-device-with-a-third-screen
Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020
Visit/security/cyber-security/355271/microsoft-gobbles-up-corpcom-domain-to-keep-it-from-hackers
cyber security

Microsoft gobbles up corp.com domain to keep it from hackers

8 Apr 2020