6 year old teenager compromised Apple networks to steal GBs of sensitive data !!
6 year old teenager compromised Apple networks to steal GBs of sensitive data !!
The teenager from Melbourne, Australia, managed to break into Apple servers and downloaded some 90GB of secure files, including extremely secure authorized keys used to grant login access to users, as well as access multiple user accounts.
Reportedly, a minor has managed to compromise the iPhone maker’s server and stolen 90GB of confidential files. However, Apple claims that none of the customers’ data has been compromised in the security breach.
The 16-year old Australian teen successfully accessed customer accounts apart from stealing sensitive files. The hacker, whose name hasn’t been made public because of him being under-age, stored the stolen data in a folder interestingly titled as “hacky hack hack.”
The hacker has already been arrested and presented before a Melbourne children’s court where he admitted to compromising Apple’s mainframe and downloading the internal files. The reason he gave for the hacking was that he was a big fan of Apple.
The defense attorney representing the accused claims that his client hacked into the company’s network on more than one occasion and kept accessing it for one year. Since the teen wanted to get employed at Apple, therefore, he chose this method to achieve his objective. The hacker is a well-known personality within the international hacker fraternity.
According to an official spokesperson of Apple, the security of customer data and the company’s internal networks was its foremost priority.
“In this case, our teams discovered the unauthorized access, contained it, and reported the incident to law enforcement. We regard the data security of our users as one of our greatest responsibilities and want to assure our customers that at no point during this incident was their personal data compromised,” explained the spokesperson.
Investigation reveals that the teen utilized Virtual Private Networks (VPNs) and other systems to conceal his identity and kept accessing Apple’s servers for a year during which he obtained access to authorized keys. These keys are responsible for granting log-in access to users and have to be kept secure from unauthorized access.
Post a Comment