News: Apple Says iPhone & iCloud Are Safe After Claimed Breach by 'Turkish Crime Family'

News: Apple Says iPhone & iCloud Are Safe After Claimed Breach by 'Turkish Crime Family'

New statements from Apple make it clear that they do not believe a hacker, or group of hackers, breached any of their systems. This comes after a recent report from Motherboard that a hacker gang called the "Turkish Crime Family" is threatening to remotely wipe up to 559 million iPhones by April 7.The hackers claim they hold an alleged cache of stolen accounts, and their goal is to shake down the big Apple for $75,000 in Bitcoin or Ethereum cryptocurrency. Alternatively, in lieu of those options, they will even accept $100,000 in iTunes gift cards (a potentially risky option for them).Apple responded to the allegation that the hackers breached its systems, assuring their systems were not compromised, but did not confirm if the hackers do in fact hold an entire collection of Apple IDs and passwords. Whatever information they do have, probably came from previously comprised third-parties."If the list is legitimate, it was not obtained through any hack of Apple," an Apple spokesperson told Fortune in an email. "There have not been any breaches in any of Apple's systems including iCloud and Apple ID."Even if the data didn't come from an Apple breach, it could still mean your iCloud login details are out there. Fortune suggested that the logins could be from the LinkedIn hack, in which login info from 117 million accounts was sold on the black market site "The Real Deal." Though, if the Turkish Crime Family really has 559 million accounts, well, a mere fraction of the 117 million from LinkedIn doesn't really cut it.Don't Miss: The 4 Best Phones for Privacy & SecurityThe hackers have been sending login information to media companies in an effort to gather attention to their scam. For example, The Next Web received a small fraction of the alleged data from the hackers, and cross-referenced the info with the site Have I Been Pwned, which checks to see if your email or username has been compromised in a hack.Most of the samples provided to TNW don't appear to have been involved in the LinkedIn hack or other hacks in the Pwned database, but TNW was able to access the accounts with the login information provided by the hackers, so the info looks legitimate. They can't test every login, so the small sample may not be indicative of the whole.The Turkish Crime Family also noted to TNW that all conversations with Apple were actually kept private and never reported to Motherboard. Instead, the conversation between the Turkish Crime Family and Motherboard were led by a member that has now been removed for his "inaccuracy" and "lack of professionalism," an the group denies the authenticity of Motherboard's report. Overall, the hacking team seems to have a hard time sticking to one story.Now, the hacker group is confirming Apple's statement that its systems have not been breached, and that the stolen data was obtained through previously compromised systems over the last five years. The Turkish Crime Family is, in fact, not contradicting Apple. They did not breach the company, nor did they ever state to Motherboard that they stole the info directly from Apple.Rather, after Motherboard's breaking March 21 report, a breach was assumed by some news outlets such as BGR, though most media sites never directly stated that the hackers breached Apple. The Turkish Crime Family's initial response to Motherboard, and the group's only statement, was to extort Apple over an alleged cache of iCloud and other Apple email accounts. The group never stated where their cache of data came from until today when they contacted TNW in response to Apple.Don't Miss: 'Hackers-for-Hire' Attempted to Steal Baidu's Self-Driving Car SecretsCheck out the group's response to Apple, which they wrote and shared with TNW on Pastebin, a site where users can store text online for a specific period of time. Pastebin gets an unjust bad rap thanks to its popularity among cyber thieves, and is now being linked to yesterday's London attack. Image by Turkish Crime Family/Pastebin Yes, this could all be a game played by this hacking group to bring attention to their extortion efforts and gain publicity, but again, you never know.Don't Miss: 23 Important iOS 10 Privacy Settings Everyone Should Double-CheckChanging your iCloud passwords and all accounts associated with your Apple account password would be a good idea either way. Enabling two-step authentication is also a good safety step. To do this, go to Settings on your iPhone, select "iCloud," then tap your Apple ID and choose "Password & Security." Then, select "Turn on Two-Factor Authentication" and follow the prompts. This will ensure that no one can log into your iCloud account unless they have physical access to your deviceĆ¢€”even if they've hacked your password.Also, if you're too lazy to update all your passwords, you should check to see if your accounts have been hacked on Have I Been Pwned and change any passwords that are the same as the leaked ones associated with your email info. Once all that's taken care of, scroll through the Turkish Crime Family's Twitter and laugh at their spooky claims.In the same email to Fortune, an Apple spokesperson stated that the company is actively monitoring the situation and working with law enforcement to identify the criminals.Don't Miss: Advice from a Hacker: How to Create Stronger PasswordsFollow Gadget Hacks on Facebook, Twitter, Google+, and YouTube Follow Apple Hacks on Facebook, Twitter, and Pinterest Follow WonderHowTo on Facebook, Twitter, Pinterest, and Google+
Cover image via Max Pixel



HTC 10. The HTC 10 is more than just the company's flagship smartphone for 2016. It is what will hopefully bring HTC back on its feet after years of losing precious market share. Knowing this, HTC has done its best to make the 10 as awesome as possible. The phone has the looks and
These are the best smartphone cameras you can buy: Digital


IP-based Geolocation is mapping of an IP address or MAC address to the real-world geographic location of an Internet-connected computing or a mobile device. Geolocation involves in mapping IP address to the country, region (city), latitude/longitude, ISP and domain name among other useful things.
How to Trace Any IP Address | GoHacking


1. Launch an app containing your document. The iPhone's cut and paste option is available only on apps that can edit documents, such as Pages, Google Drive, Office Mobile for Office or Microsoft
How To Use Cut, Copy And Paste Feature On Apple iPhone 8 And

The Easiest Way to Transfer Files Between Different Cloud


People use Facebook to keep up with friends, to share links, to share photos and videos of themselves and their friends, and to learn more about the people they meet." -- Facebook. Hack Facebook! See how to hack accounts with Facebook Freezer. The Facebook Freezer freeze's user's accounts for as long as you want!
Hack Facebook Accounts With Facebook Freezer | 101hacker


This feature is not available right now. Please try again later.
Super Quick Potato Peeling! - Life Hack - YouTube


Buy and sell electronics, cars, fashion apparel, collectibles, sporting goods, digital cameras, baby items, coupons, and everything else on eBay, the world's online marketplace


How To: MAKE BALLOON ANIMALS THE EASY WAY How To: MAKE BALLOON SWORDS THE EASY WAY News: Who Needs Clowns? 3D Printer Lets You Print Inflatable Rubber Balloon Animals How To: make balloon headphones! News: Great Books for The Balloon Artist and Entertainer
Pet Feeder Entered in Instructables 3D Printer - WonderHowTo


The Titan M is Google's second generation security module, this time designed for lower power applications like phones. The first generation Titan chip was designed for Google Cloud data centers.
The Titan M Chip Powers Up Pixel 3 Security | WIRED


Those of you with a Samsung device looking to add a custom boot animation, your prayers have finally been answered. Thanks to the work of XDA members anbech and smokin1337, it can finally be
How To Change, Customize & Create Android Boot Animation [Guide]


How To: Change the Default Snooze Time on Your iPhone's Alarm How To: Use Custom Voice Commands to Sleep or Snooze Your Galaxy S4's Alarm Hands-Free How To: Wake Up Faster with a Back-Talking, Snooze-Hating Alarm Clock on Your Nexus 5
How to change the snooze time on an iPhone: Tips - Business


How to Surf the Web Anonymously with Proxies. This wikiHow teaches you how to stay anonymous while browsing the Internet. It also teaches you how to find online proxy sites, as well as how to enable proxies through Chrome, Firefox,
How to surf the web anonymously and keep Chrome from tracking you

0 comments:

Post a Comment