Australian teen 'hacked Apple mainframe', sparking FBI investigation

Teenage Apple fan stole 90GB of Cupertino's confidential data

The Apple logo superimposed over Uluru in Australia, also known as Ayer's Rock

Apple's internal systems were breached by an Australian teenager who made off with 90GB of confidential files, prompting an FBI investigation.

Australian courts were told that the private schoolboy from Melbourne, who started his activities at the age of 16, developed custom software tools to bypass Apple's security measures and hide his identity. According to Australian newspaper The Age, the hacking tools and instructions were saved in a folder named "hacky hack hack".

The defendant's lawyer said that the reason he broke into Apple's mainframe was that he was a fan of the company, and the teen himself reportedly told police that he "dreamed" of working for the Cupertino-based tech giant. According to his lawyer, the teen is a well-known figure in the hacking community.

The boy allegedly infiltrated Apple's systems multiple times over the course of a year, and in addition to 90GB of files, also accessed 'authorised keys' - secure authentication tokens which are used to validate user logins.

Once Apple detected his presence in their networks, the company contacted the FBI, the court heard. The US agency then contacted their antipodean counterparts, the Australian Federal Police, which searched the defendant's family home and discovered computer hardware linking him to the attacks.

"Two Apple laptops were seized and the serial numbers matched the serial numbers of the devices which accessed the internal systems," a prosecutor said. "A mobile phone and hard drive were also seized and the IP address ... matched the intrusions into the organisation."

"The purpose was to connect remotely to the company's internal systems."

The teen, who supposedly bragged about the attacks over WhatsApp, is due to be sentenced next month.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Global ransom DDoS extortionists are retargeting companies
distributed denial of service (DDOS)

Global ransom DDoS extortionists are retargeting companies

22 Jan 2021
Best ransomware removal tools
ransomware

Best ransomware removal tools

22 Jan 2021
Hackers publish over 4,000 files stolen from SEPA in ransomware attack
Security

Hackers publish over 4,000 files stolen from SEPA in ransomware attack

22 Jan 2021
BEC scammers are using Google Forms to identify easy victims
phishing

BEC scammers are using Google Forms to identify easy victims

21 Jan 2021

Most Popular

School laptops sent by government arrive loaded with malware
malware

School laptops sent by government arrive loaded with malware

21 Jan 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
What is the Raspberry Pi Pico?
Hardware

What is the Raspberry Pi Pico?

21 Jan 2021