The Fake iCloud Heist: How a Would-Be Hacker Tried to Ransom Apple
A London man’s audacious blackmail plot against Apple unraveled as investigators exposed the bluff behind his cybercrime claims.
On a chilly March morning in 2017, Apple’s security team received an alarming email: a hacker claimed to have breached millions of iCloud accounts and threatened to wipe them unless the tech giant paid $100,000 in iTunes gift cards. The sender, Kerem Albayrak from north London, seemed to have Apple’s fate in his hands. But as investigators would soon reveal, the reality behind the digital blackmail was far more illusion than infiltration.
The Anatomy of a Bluff
Albayrak’s campaign began with a bold claim: he had supposedly accessed the credentials of hundreds of millions of iCloud users. To prove his point, he posted a video online that appeared to show him accessing two accounts, raising the stakes by threatening to dump the data or reset accounts if Apple didn’t pay up. His demands shifted between cryptocurrency and iTunes gift cards - an unusual ransom for a company that handles billions in revenue each quarter.
But as Apple’s security experts dug deeper, the story began to unravel. Internal investigations found no signs of a system compromise. There was no evidence that Apple’s servers had been breached, nor that Albayrak possessed the alleged data trove. Instead, it appeared the so-called “hack” was little more than smoke and mirrors - a bluff intended to scare Apple and garner attention for a hacking tool Albayrak was promoting.
Within two weeks, law enforcement traced the threats to Albayrak’s north London home. He was arrested and ultimately pled guilty, receiving a two-year suspended jail sentence, 300 hours of unpaid work, and a six-month electronic curfew. The case highlighted both the audacity and amateurism that can accompany modern cyber extortion attempts.
Cybercrime’s Changing Face
Albayrak’s failed gambit is a cautionary tale for both would-be hackers and their potential victims. The case underscores the importance of robust internal security measures - and the need for companies to thoroughly investigate extortion claims before reacting. Meanwhile, Albayrak has since rebranded himself, sharing his side of the story in a podcast and reportedly working in cybersecurity, proof that even failed cybercriminals can find a second act in the industry they once targeted.
Conclusion
The Apple blackmail plot was less a heist than a hoax - an audacious attempt to cash in on fear and reputation. As cybercrime evolves, so too must our skepticism and our security, reminding us that not every digital threat is what it seems.
WIKICROOK
- iCloud: iCloud is Apple’s cloud service that stores and syncs data like photos and contacts across devices. A breach can expose sensitive personal information.
- Ransomware: Ransomware is malicious software that encrypts or locks data, demanding payment from victims to restore access to their files or systems.
- Cryptocurrency: Cryptocurrency is a digital currency secured by cryptography, enabling secure, decentralized transactions and often used for both legal and illicit activities.
- Suspended Sentence: A suspended sentence delays jail time, letting cybercrime offenders avoid prison if they meet court-imposed conditions during a probation period.
- Curfew Order: A curfew order mandates staying at home during certain hours, often enforced electronically, to monitor compliance and enhance public safety.