The cause of the "Celebgate" will go to jail in the United States

iWork-for-iCloud

You will remember a while ago how a famous incrusion (or supposed hack) of the iCluod services caused the leak to the public sphere of hundreds of photographs of many celebrities in all areas, from the world of cinema to sports, were affected by this. leak of private photographs in which Jennifer Lawrence could be seen in intimate poses, for example. So, ehe cause of all this collapse that has put Apple in question for months, has been found guilty in the United States and will be serving a prison sentence.

A man from Pennsylvania, caused by hacking and "phishing", illegally accessing more than one hundred Apple and Google email accounts, including many celebrities from the entertainment industry in Los Angeles. This gentleman was Ryan Collins, thirty-six years old, born in Lancaster, Pennsylvania. Today he has accepted the charges of "computer fraud" and "violation of privacy" that were charged against him, in this way, Ryan has confirmed that he made unauthorized access to private and protected computers, with the intention of obtaining the necessary information to perform their misdeeds.

Despite the fact that Ryan Collins was indicted in Los Angeles, the residence of most of those affected by his lack of ethics and his desire for fame, both parties agreed to transfer the case to Harrisburg, in the Middle District of Pennsylvania, a closest place to the home of Ryan Collins, since he is a native of there. In this place, you can carry out the sentence attributed to you, orA maximum of five years in federal prison, despite the fact that the affected parties requested about a year and a half.

How did you carry out the criminal network?

iCloud pricing

It was between November 2012 and September 2014 when this criminal activity began. Collins sent emails to these celebrities that mimicked the official emails sent by Google or Apple with the intention of making them itch into need. For this, it requested in the emails the access data to their accounts with the intention that the celebrities in an act of irresponsibility would offer them, we warn that a company that provides services will never request this data from you by email.

Once Collins got hold of the data, accessed the email and iCloud accounts of these people involved. From there he only had to store all the information and images / videos that these people were storing in their clouds with complete peace of mind, in addition to the telephone contacts, you already know that the agendas are synchronized in the cloud as well. In the case of iCloud accounts, Collins downloaded all the content from the backups, we do not know with what intention.

In this way, Collins had access to more than 50 iCloud accounts and more than 72 Gmail accounts. What the investigation has not been able to demonstrate is that Collins himself would have been the one who shared the images of the nudes of these people on the network, if his sentence were discovered or confessed and his subsequent stay in jail could be extended. However, he has not wanted to plead guilty to sharing this information.

What is Google and iCloud's fault?

Google-logo-new

Really little. Much was said about Apple and Google being totally guilty of what happened, for not implementing the necessary security. This is because at first it was thought that the iCloud service was hacked, but it was not., was a simple phishing in which users fell as computer illiterate of the highest level. There are many occasions in which companies report that they will never, under any circumstances, request this information by email.

However, it seems that the filters against phishing will have to be increased, as more and more victims of these illegal activities, and the damage that occurs more and more.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.