Apple: Has the source code of internal tools been stolen?

A recent alleged cyber attack may have compromised the security of Apple. A hackersknown by the pseudonym of Intel Broker, claimed to have stolen the source code of three tools used internally by the company. If the news were confirmed, there could be consequences serious. The latter, in fact, would affect both the privacy of company data and customer data.

The post published by IntelBroker on a hacker forum does not provide further details. Generally, in case of IT violations significant, cybercriminals tend to sell stolen data, including source codes. In this case, however, it seems that there is no intent to monetize the attack.

Apple hit by alleged hacker attack?

Second DarkWebInformera source on XIntelBroker has actually published online the source code of these internal tools. Among these, there is AppleConnectSSOa tools now obsolete for several years which allowed employees to authenticate And log into to other internal applications. Furthermore, there is AppleHWEConfluenceAdvanceda similar tool that required employee authentication and is currently down. Finally, there is AppleMacroPluginon which the available information is more limited and its usefulness is unclear.

AppleInsider he tried to obtain clarifications from Apple which for the moment he has not yet released official statements. It is important to note that the IntelBroker allegations come at an already delicate time for the technology sector. Recently, the same hacker had claimed to have attacked AMD. In this case, stealing information about future products, employee and customer databases, and financial data. Speaking of which, AMD has started investigations to verify the veracity of the accusations.

In 2023, there was a significant increase in DDoS attacks of 94%. This trend is even more worrying if we consider the growing use ofartificial intelligence to perpetuate attacks of this type. The situation highlights the importance for companies to introduce security measures adequate.

 
For Latest Updates Follow us on Google News
 

NEXT The Shazam mechanism revealed: this is how song recognition works