Jennifer Lawrence nude photo hack could be first of its kind

Jennifer Lawrence, Kate Upton, and others have been targeted by a hack that allegedly stole nude pictures and explicit videos. If confirmed, the hack points to a new mutation in how hackers are trying to profit from illegal exploits.

|
Jordan Strauss/Invision/AP
Jennifer Lawrence arrives at the Oscars aerlier this year at the Dolby Theatre in Los Angeles. Ms. Lawrence has been targeted by a hacker who claims to have collected dozens of personal and explicit pictures of her.

A hacker's claims to have broken into several high-profile celebrities' online accounts – stealing nude pictures of them and posting them on a popular message board – has apparently been confirmed by at least two celebrities and has prompted claims of "violation of privacy" from others. 

Facts about the alleged hack remain unclear, but the hacker's claims, if true, could point to a new mutation in the ways that malicious Internet actors violate users' privacy and profit from it.

The hacker claims to have broken into the Apple iCloud accounts of dozens of celebrities including actress Jennifer Lawrence, model Kate Upton, and singer Ariana Grande, stealing personal photos and posting a selection online.  

One of the actresses targeted, Mary Elizabeth Winstead, appeared to acknowledge on Twitter that the pictures of her were genuine.

Representative for Ms. Lawrence also confirmed that the images were genuine, according to a statement made to Buzzfeed.

"This is a flagrant violation of privacy," they said in an e-mail. "The authorities have been contacted and will prosecute anyone who posts the stolen photos of Jennifer Lawrence."

A representative for Ms. Upton made a similar statement, according to ABC News.

"This is obviously an outrageous violation of our client, Kate Upton's, privacy," the spokesperson said. "We intend to pursue anyone disseminating or duplicating these illegally obtained images to the fullest extent possible."

Meanwhile, others, including Ms. Grande and Olympic gymnast McKayla Maroney, said the images were fake. 

Technology site ZDNet notes that a day before the leak, the code for an iCloud hack was uploaded to the site GitHub. The hack was intended to enable "brute force" hacking of online Apple accounts.

Normally, several consecutive failed attempts to log into an Apple account will result in that user being locked out. This safety feature prevents potential hackers from besieging an account with an endless list of invented passwords in an attempt to find the right one. But the hack posted to GitHub aimed to circumvent the Apple lockout function to enable brute force hacking.

Apple has now patched its system to fix this vulnerability, Adrian Kingsley-Hughes of ZDNet reports. "Whether the two incidences are linked is at present unknown," he writes.

But the "Cult of Mac" blog suggests this hack could be unique, in that it allegedly was carried out for bitcoins, the online currency. The hacker has claimed to have more explicit photos and videos, and has even posted a master list of celebrities hacked, but is demanding payment for them in bitcoins.

If confirmed, that "most likely makes this a first," writes Luke Dormehl.

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to Jennifer Lawrence nude photo hack could be first of its kind
Read this article in
https://www.csmonitor.com/Technology/2014/0901/Jennifer-Lawrence-nude-photo-hack-could-be-first-of-its-kind
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe