Apple denies iCloud hack resulted in leaked celebrity photos

iPhone maker responds to reports an iCloud hack led to the leaking of private celebrity pictures online

Apple has dismissed claims an iCloud hack resulted in numerous private photographs of female celebrities being leaked online.

In a statement to the press, released overnight, Apple denied the leaked photographs were in the public domain because iCloud was breached. 

"After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the internet," the statement reads.

"None of the cases we have investigated has resulted from any breach in any of Apple's systems, including iCloud and Find my iPhone.

"We are continuing to work with law enforcement to help identify the criminals involved," it concluded. 

On Monday, news emerged about the publication of hundreds of private pictures belonging to female celebrities, including Hunger Games star Jennifer Lawrence and Spiderman actress Kirsten Dunst, on the Reddit and 4Chan messageboards.

The photos, it was claimed, were obtained by hackers who managed to infiltrate Apple's online backup service iCloud using a tool called iBrute.

This allows hackers to repeatedly submit potential passwords to Apple's Find My iPhone service login page until they uncover the correct one.

Once accessed, it is then possible for the hackers to access data stored in the iCloud account belonging to the breached Apple ID.

As reported by IT Pro yesterday, Apple has now patched the security flaw that allowed the hackers to repeatedly test passwords without being locked out.

Speaking to the Associated Press news agency, a spokesperson for the FBI said it is "aware of the allegations" and making moves to address them.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

CMS platforms succumb to KashmirBlack botnet as businesses rush online
Security

CMS platforms succumb to KashmirBlack botnet as businesses rush online

22 Oct 2020
Government agencies see misconfigured cloud services as top security threat
Security

Government agencies see misconfigured cloud services as top security threat

22 Oct 2020
Lookout reveals mobile-first endpoint detection and response solution
Security

Lookout reveals mobile-first endpoint detection and response solution

21 Oct 2020
Cisco finds an increase in security concerns due to remote working
Security

Cisco finds an increase in security concerns due to remote working

21 Oct 2020

Most Popular

The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020