Thursday, April 10, 2025
HomeComputer Security16 Years Old Australian Teen Hacked into Apple's Secure Network & Download...

16 Years Old Australian Teen Hacked into Apple’s Secure Network & Download the Sensitive Files

Published on

SIEM as a Service

Follow Us on Google News

A teen from Australia got arrested and sentenced for hacking the Apple’s ultimate secured network and accessing some sensitive data from an internal network.

Melbourne Police did not reveal his name and identity and he accessed the Apple’s mainframe from his home on multiple times.

  1. His culpable from the age of 16 saw him create a computer tunnel and web-based bypassing network by hiding his identity until the point when an attack on his family home revealed a reiteration of hacking documents and guidelines all spared in an organizer titled “hacky hack hack”.

a court report says, that he was such a fan of the company also he did this Apple’s secure computer network multiple times.

- Advertisement - Google News

A prosecutor report stated that the Police uncovered two Apple laptops in teen’s home with serial numbers matching the devices that had accessed Apple’s network.

Also, they analyse the phone & hard drive that owned by the teen contains a clear indication that completely matched this Apple Data Breach.

He had multiple conversations in WhatsApp that he told others regarding his hack and the Officials believe the boy learned to hack at 16. He reportedly accessed customer accounts and downloaded 90gb of sensitive files.

According to The Age, The major international investigation was sparked when Apple contacted the FBI, who passed the allegations on to the AFP. The AFP found the software that had enabled the hacking had been installed on the teen’s laptop.

The access was keep in alive untill Apple detected this incident into the authorized keys that grant log-in access to users and are said to be extremely secure.

The court said that the access “worked flawlessly” until the teen was caught and he told police that he had “dreamed of” working for Apple.

Also Read:

Timehop Data Breach – 21 Million Users Personal Data Stolen By Hackers

15-year-old Hacker Acted as CIA Chief to Gain access to Extremely Sensitive Accounts

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

PAN-OS Command Injection Flaw Lets Hackers Execute Arbitrary Code Remotely

Palo Alto Networks has disclosed a medium-severity vulnerability (CVE-2025-0127) in its PAN-OS software, enabling...

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message...

Two Cybercriminals Arrested for ATM Jackpotting Scheme

Federal authorities have unveiled details of a sophisticated cybercrime operation targeting financial institutions across...