• Articles
    • Editorial Articles
    • Research Articles
    • WatchGuard Articles
  • The 443 Podcast
  • Threat Landscape
  • About
    • About Us
    • Contact Us
    • Contribute to Secplicity

Secplicity - Security Simplified

Powered by WatchGuard Technologies

Teen Steals Apple’s Keys

August 28, 2018 By Trevor Collins

iPad VPN

A teen in Melbourne, Australia was able to hack into Apple’s networks and retrieve over 90 GB of data in the course of a year. Investigators found “authorized keys,” likely private authentication keys, on the teen’s computer. He used VPNs to gain access to Apple servers to download this data which he saved in a folder conveniently named “hacky hack hack.” After gaining access to Apple servers, he then bragged about it on WhatsApp.

Apple is known to be a security-conscious company. This teen must have been very smart or at least very lucky to accomplish the breach. He also told the investigators that he dreamed of working for Apple, which Apple may want to consider once his sentence is finished.

After Apple detected the intrusion they contacted the FBI who in turn contacted the Australian Federal Police. All three parties worked together to investigate the breach and they caught the teen soon after that. His name was not released because neither the teen nor Apple wanted to release any case details, and the hacker is a minor. Furthermore, his lawyer said that he is well known in the hacker community and any details released from the case may put him in danger.

The Australian Federal Police raided the teen’s house with a search warrant and found Apple computers, mobile phones and hard drives, including devices with serial numbers  that matched those from the attack. With so much evidence against him he pleaded guilty in court and is now awaiting sentencing.

This incident shows that even Apple, a known security-conscious company, can become compromised. Companies today need to be prepared when the attack comes which is no longer a matter of if but when. Having a recovery system set up beforehand is critical to reduce downtime and lost profits. Most experts recommend that recovery tools and services make up at least 20% of your network security budget to quickly recover from any loss of data and to prevent downtime. Paired with a strong defense-in-depth strategy can keep your business running even when the teenage hackers come knocking.

Share This:

Related

Filed Under: Editorial Articles Tagged With: Hacking, Infosec news

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

The 443 Podcast

A weekly podcast featuring the leading white-hat hackers and security researchers. Listen Now
the 443 podcast

Threat Landscape

Filter and view Firebox Feed data by type of attack, region, country, and date range. View Now
threat landscape

Top Posts

  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
  • Here Come The Regulations
  • Successfully Prosecuting a Russian Hacker

Email Newsletter

Sign up to get the latest security news and threat analysis delivered straight to your inbox

By signing up you agree to our Privacy Policy.


The views and opinions expressed on this website are those of the authors and do not necessarily reflect the policy or position of WatchGuard Technologies.

Stay in Touch

Recent Posts

  • Cybersecurity News: LastPass Incident Revealed, White House Issues Cybersecurity Strategy, FBI Purchases Leaked USHOR PII Data, and a Slew of Other Breaches
  • An Update on Section 230
  • Here Come The Regulations
  • US National Cybersecurity Strategy
  • Cybersecurity News: Free Cybersecurity Training, TrickBot Group Exposed, Major GoDaddy Breach, and Russia to Legalize cybercrime?!
View All

Search

Archives

Copyright © 2023 WatchGuard Technologies · Cookie Policy · Privacy Policy · Terms of Use