A group of threat actors has leaked some intimate photographs and videos of hundreds of female athletes and celebrities, mostly women. Affected athletes are looking for help removing this exposed content on dark web, a Daily Mail report mentions.
“It’s really hard to know what to do in the face of such a situation,” said the agent of one of the victims of the incident: ‘People behind these attacks are sick. We have seen some very unpleasant cases, including where people have been blackmailed in exchange for not publishing the compromised material.”
Although it is possible to take action against those responsible for these attacks, bringing them to justice is often an impossible mission: “It can take years to close these cases and get the content removed from any website, many times victims decide not to go through that process,” says a spokesman for the National Cyber Security Center (NCSC).
In response to such incidents, cybersecurity specialists recommend users enable security mechanisms such as multi-factor authentication, as well as set passwords secure enough to reduce the chance of cyberattack.
This new incident would have been a consequence of the commitment to some iCloud accounts, although Apple has not commented on it. This incident may not be so surprising, as it was only a few hours ago that English football club Manchester United was also the subject of a cyberattack deployed by a sophisticated cybercriminal group.
The consequences of this incident are still unknown, although the club’s first statement regarding the cyberattack notes that its website infrastructure, mobile app, and systems that store customer information are completely safe from attack.
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.