+

Cookies on the Business Insider India website

Business Insider India has updated its Privacy and Cookie policy. We use cookies to ensure that we give you the better experience on our website. If you continue without changing your settings, we\'ll assume that you are happy to receive all cookies on the Business Insider India website. However, you can change your cookie setting at any time by clicking on our Cookie Policy at any time. You can also see our Privacy Policy.

Close
HomeQuizzoneWhatsappShare Flash Reads
 

Analysis Of Kate Upton Photos Shows Hackers May Have A Backup Of Her Entire iPhone

Sep 4, 2014, 15:33 IST

Sports IllustratedKate Upton

It just got even worse for the 101 celebrities whose naked photos were hacked from their iCloud accounts: An analysis of the metadata on Kate Upton's photos show that her account was hacked using a priece of sofware intended for law enforcement agencies which downloads an entire backup copy of all the files on a target's iPhone.

Advertisement

The software is called EPPB, or Elcomsoft Phone Password Breaker. It is intended for police departments and government agencies who want to "rip" entire copies of iPhones for evidence. We first saw the story on 9to5Mac, but the full account is on Wired. Here's the key section:

If a hacker can obtain a user's iCloud username and password with iBrute, he or she can log in to the victim's iCloud.com account to steal photos. But if attackers instead impersonate the user's device with Elcomsoft's tool, the desktop application allows them to download the entire iPhone or iPad backup as a single folder, says Jonathan Zdziarski, a forensics consult and security researcher. That gives the intruders access to far more data, he says, including videos, application data, contacts, and text messages.

... Based on his analysis of the metadata from leaked photos of Kate Upton, he says he's determined that the photos came from a downloaded backup that would be consistent with the use of iBrute and EPPB. If a full device backup was accessed, he believes the rest of the backup's data may still be possessed by the hacker and could be used for blackmail or finding other targets.

Read the whole thing here.

Advertisement

You are subscribed to notifications!
Looks like you've blocked notifications!
Next Article