Colin Mc Hugo

0 %
Colin Mc Hugo
Security Engineer Manager & CEO at Quantum Infinite Solutions Group Ltd.
  • Residence:
  • County:
  • Country:
Cyber Security Incident Response
Management & Architecture of Cyber Security Teams
Solutions & Coaching
  • Cyber Security Incident Response
  • Management & Architecture of Cyber Security Teams
  • Solutions
  • Training & Coaching

Man impersonates Apple support, steals 620,000 photos from iCloud accounts

August 27, 2021

The person was after sexually specific photographs and movies that he would then share on-line or retailer in his personal assortment

A California man has fessed as much as breaking into the Apple iCloud accounts of a whole bunch of people and downloading greater than 620,000 photographs and 9,000 movies whereas on the prowl for nude photographs of younger girls. He would then share or commerce these photographs on-line or maintain them for his personal assortment.

Hao Kuo Chi, a 40-year-old citizen of La Puente, Los Angeles County, pleaded responsible to 4 counts together with committing laptop fraud, in response to a report by the Los Angeles Times. Going by the net deal with “icloudripper4you”, he billed himself as being adept at infiltrating iCloud accounts and pilfering their content material, an exercise he known as “ripping”.

In keeping with his plea settlement, Chi was in a position to entry the iCloud accounts of a minimum of 306 victims from round america. After investigators searched his home, he additionally admitted to infiltrating some 200 accounts on the behest of people that he had met on-line.

“Chi acknowledged in court docket papers that he and his unnamed co-conspirators used a international encrypted e mail service to speak with one another anonymously. After they got here throughout nude photographs and movies saved in victims’ iCloud accounts, they referred to as them ‘wins,’ which they collected and shared with each other,” reads the Los Angeles Occasions report.

To attain his purpose, Chi contacted his victims and duped them into parting with their Apple IDs and passwords by masquerading as an Apple buyer assist agent utilizing numerous e mail accounts. The Federal Bureau of Investigation (FBI) mentioned that it was in a position to pinpoint two Gmail addresses that have been used to trick victims – “applebackupicloud” and “backupagenticloud”, which contained in extra of half 1,000,000 emails. These included some 4,700 emails with iCloud consumer IDs and passwords that Chi acquired. In keeping with the FBI, Chi had over 620,000 photographs and 9,000 movies, which have been partly organized based mostly on whether or not they contained specific photographs or not.

The right way to maintain your Apple account safe

Phishing campaigns are one of many favourite instruments in a cybercriminal’s device bag. Over time, on-line fraudsters have been finetuning their ruses, a lot in order that many schemes may be difficult to spot even for the skilled eye. Nonetheless, there are nonetheless a number of steps you’ll be able to take to maintain your accounts safe:

  • For those who obtain an unsolicited e mail from a service you supposedly use, scrutinize the e-mail tackle; if it didn’t come from an official assist tackle (on this case Gmail) you’re most likely coping with a rip-off.
  • Look out for dangerous spelling and quite a few grammar errors, most of the time, phishing emails are riddled with them.
  • At all times allow two-factor authentication (2FA), which acts as an additional layer of safety and makes it more durable for cybercriminals to infiltrate your account even when they’ve entry to your password. Apple lets you use one among your Apple units as an authentication issue by displaying a verification code on it. Moreover trusted units, you may as well arrange trusted telephone numbers by following Apple’s handy guide to their 2FA settings.

If you wish to take a deep dive into the tell-tale indicators of phishing, learn our article on how to recognize phishing messages. For those who’d like to check your self on whether or not you’re adept at recognizing the phish, you’ll be able to take our phishing quiz.

Posted in SecurityTags:
Write a comment