Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy Cloud Crime Security

'RipSec' Goes To Hollywood: How the iCloud Celeb Hack Happened 28

mask.of.sanity writes: The chief hacker behind the infamous iCloud celebrity hacks has revealed in a documentary how the group dubbed RipSec shook Hollywood by plundering thousands of naked photos and financial data of Tinsel Town icons. The film maker gained access to RipSec using a photoshopped naked image of major TV star who offered access to her iCloud account. "I contacted some of the celebrities and she gave me access to her account," Doering says. "From there I baited them (the hackers)."
This discussion has been archived. No new comments can be posted.

'RipSec' Goes To Hollywood: How the iCloud Celeb Hack Happened

Comments Filter:
  • Social engineering the hackers....

  • hacking is fun times.
  • by Anonymous Coward

    Seen Natalie Portman naked and petrified

  • Summary Confusion (Score:1, Insightful)

    by Anonymous Coward

    Is it my poor reading comprehension, or does this summary make little sense?

    -apk

    • Re: (Score:2, Funny)

      by Anonymous Coward
      Perhaps your hosts file blocked something in the summary.
    • Re:Summary Confusion (Score:5, Informative)

      by pastafazou ( 648001 ) on Friday September 25, 2015 @11:46AM (#50597545)
      It's a poorly written summary. The deal is, the filmmaker gained access to the hackers by talking to a bunch of hollywood actresses. One of them agreed to give him access to her account, and he then photoshopped her face onto some naked pics and uploaded them to her account. He then contacted the hacker group, claiming to have hacked her account, and they let him in.
  • TLDR (Score:4, Informative)

    by MagicM ( 85041 ) on Friday September 25, 2015 @12:09PM (#50597757)

    "stolen or guessed iCloud login credentials to gain access to photos [and] restored iCloud backups [giving them] photos from MMS messages [even those] erased from user phones"

  • The alleged RipSec administrator's responses sound scripted and rehearsed. And he sounds overly cocky. The voice/appearance is heavily disguised, so the admin could actually be the narrator in a hoodie for all you know.
  • Watched the clip from the film [vimeo.com]. Several small signs betray the supposed interviewee as a not-very-good actor reading a script. So either that script consists of emails from the actual RipSec guy (in which case that fact should be stated more clearly in the disclaimer at 0:09), or this is a complete fake. Documentary makers - be honest about your little dramatic flourishes, or your whole story becomes suspect. YOU become suspect.
    • The film is definitely trying too hard to "appear" legitimate. The RipSec "administrator" interview sounds scripted and looks fake. Look, we're just like VICE, driving in a car to meet someone in the dark with a flashlight. Sure come on over to my house and film me in front of my monitor scrolling through logs files. If they really got an interview with the RipSec "administrator" they wouldn't need to chop it up into bits by cutting to shots of fake victims on their computers and phones. Scripted. Fake.
  • In spite of this, I still believe that the bulk of the pics were the results of late night Sys Admins' perusal of data files.

The use of money is all the advantage there is to having money. -- B. Franklin

Working...