Nude Celebrity Photo Hacker Jailed

Whether you chose to call it “Celebgate” or refer to it by the rather crude moniker of “The Fappening”, there’s no doubt that the leaking on the Internet of private nude photographs of dozens of Hollywood stars was one of the biggest stories of 2014.

At least 50 celebrity Apple iCloud accounts and 72 Gmail inboxes were broken into by 36-year old Ryan Collins, from Lancaster, Pennsylvania, whose victims included Jennifer Lawrence, Kirsten Dunst, Avril Lavigne, Kate Hudson, and Rihanna.

So how did Collins do it? Well, he simply tricked celebrities and their acquaintances and staff into coughing up their email passwords, by sending them emails that appeared to come from Apple or Google.

Collins was also able, in some instances, to use custom software to download the entire iCloud backups of his victims in his quest for nude photographs.

This meant that even if celebrities had not shared their private intimate snaps via email, Collins was able to extract it from their iPhone’s online backup. And, of course, unlocking the email account of one celebrity inevitably reveals the contact details of other celebrities, opening opportunities for further attacks.

In a statement issued earlier this year, FBI assistant director David Bowdlich described some of the distress that Collins’ victims must have felt:

“By illegally accessing intimate details of his victims’ personal lives, Mr. Collins violated their privacy and left many to contend with lasting emotional distress, embarrassment and feelings of insecurity. We continue to see both celebrities and victims from all walks of life suffer the consequences of this crime and strongly encourage users of Internet-connected devices to strengthen passwords and to be skeptical when replying to emails asking for personal information.”

Interestingly, there is no evidence to suggest that Collins was the person who actually leaked the photographs onto the Internet, causing such a commotion. Instead, it appears that Collins was quite content phishing celebrities, and adding to his personal collection of nude photos from November 2012 until September 2014 when “The Fappening” occurred.

One of the victims, Hollywood star Jennifer Lawrence, was blunt in her opinions of the sites which chose to share the stolen photographs with their visitors:

“It is not a scandal. It is a sex crime. It is a sexual violation. It’s disgusting. The law needs to be changed, and we need to change. That’s why these Web sites are responsible. Just the fact that somebody can be sexually exploited and violated, and the first thought that crosses somebody’s mind is to make a profit from it. It’s so beyond me. I just can’t imagine being that detached from humanity.”

And now, Collins has been sent to prison for 18 months, leaving a wife and two young children without their father. Things could have been much worse for Collins and his family, if he had not agreed to a plea bargain with the authorities, it’s possible that he could have been sentenced to the maximum of five years in prison.

In all, the authorities identified over 600 victims of Ryan Collins including many members of the entertainment industry.

And it would be a brave person who bet money that a similar attack couldn’t happen in future, as we all know how easy it can be to trick people into unwittingly revealing their password through a carefully constructed phishing email.

Let’s hope that all of the stars exposed by “Celebgate” have learnt the valuable lesson of enabling multi-factor authentication to provide an additional layer of protection on their online accounts, and that regular civilians have also wised up that you should be protecting your online accounts with more than just a password.

The advice all Internet users to enable two step verification or two factor authentication on their accounts whenever available to increase their security.

The great thing about two-step verification and two-factor authentication is that it can help protect your data, even if your password is stolen by a criminal.

WeLiveSecurity

 

« Cybercrime in Canada
Inside Anonymous - ‘Civil War’ Over Its Fight With ISIS »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The Hacker News (THN)

The Hacker News (THN)

THN is a leading source for Information Security, Hacking News, Cyber Security, Network Security with in-depth technical coverage of issues and events

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

CloudAlly

CloudAlly

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export.

National Cyber Security Centre (NCSC) - Ireland

National Cyber Security Centre (NCSC) - Ireland

The National Cyber Security Centre (NCSC) is the operational side of the Department of Communications in regard to network and information security in the Republic of Ireland.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

TAC Security (TAC Infosec)

TAC Security (TAC Infosec)

TAC Security (aka TAC Infosec) is a leading and trusted cyber security consulting partner that specializes in securing the IT infrastructure and assets of enterprises.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

Diversified Search Group - Alta Associates

Diversified Search Group - Alta Associates

Diversified Search Group is an industry leader in recruiting diverse, inclusive and transformational leadership for clients.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Bell Canada

Bell Canada

Bell is the leading provider of network and communications services for Canadian businesses and the partner for delivering network, IoT, cloud, voice, collaboration and security solutions.

TrustNet

TrustNet

TrustNet helps mid-to-large firms build trust through top-tier cybersecurity, compliance, and consulting—offering complete managed services all in one place.

SurgeONE.ai

SurgeONE.ai

SurgeONE.ai is the first AI-driven platform built to transform compliance, cybersecurity, and data across financial services—powered by experts, guided by insight.