IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Apple denies iCloud hack resulted in leaked celebrity photos

iPhone maker responds to reports an iCloud hack led to the leaking of private celebrity pictures online

Icloud with phone, ipad and laptop below

Apple has dismissed claims an iCloud hack resulted in numerous private photographs of female celebrities being leaked online.

In a statement to the press, released overnight, Apple denied the leaked photographs were in the public domain because iCloud was breached. 

"After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the internet," the statement reads.

"None of the cases we have investigated has resulted from any breach in any of Apple's systems, including iCloud and Find my iPhone.

"We are continuing to work with law enforcement to help identify the criminals involved," it concluded. 

On Monday, news emerged about the publication of hundreds of private pictures belonging to female celebrities, including Hunger Games star Jennifer Lawrence and Spiderman actress Kirsten Dunst, on the Reddit and 4Chan messageboards.

The photos, it was claimed, were obtained by hackers who managed to infiltrate Apple's online backup service iCloud using a tool called iBrute.

This allows hackers to repeatedly submit potential passwords to Apple's Find My iPhone service login page until they uncover the correct one.

Once accessed, it is then possible for the hackers to access data stored in the iCloud account belonging to the breached Apple ID.

As reported by IT Pro yesterday, Apple has now patched the security flaw that allowed the hackers to repeatedly test passwords without being locked out.

Speaking to the Associated Press news agency, a spokesperson for the FBI said it is "aware of the allegations" and making moves to address them.

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Recommended

Hackers use Linux backdoor on compromised e-commerce sites with software skimmer
malware

Hackers use Linux backdoor on compromised e-commerce sites with software skimmer

19 Nov 2021
Iranian hackers ramp up attacks against IT services sector
hacking

Iranian hackers ramp up attacks against IT services sector

19 Nov 2021
TikTok phishing campaign tried to scam over 125 influencer accounts
social media

TikTok phishing campaign tried to scam over 125 influencer accounts

18 Nov 2021
Alibaba ECS instances targeted in new cryptojacking campaign
cryptocurrencies

Alibaba ECS instances targeted in new cryptojacking campaign

16 Nov 2021

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
IT admin deletes company’s databases and is jailed for seven years
Policy & legislation

IT admin deletes company’s databases and is jailed for seven years

16 May 2022