ECONOMY & WORK
MONEY 101
NEWS
PERSONAL FINANCE
NET WORTH
About Us Contact Us Privacy Policy Terms of Use DMCA Opt-out of personalized ads
© Copyright 2023 Market Realist. Market Realist is a registered trademark. All Rights Reserved. People may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.
MARKETREALIST.COM / NEWS

Cybersecurity Researchers Charged with $2.5 Million Virtual Gift Card Fraud Against 'Apple'

The recent revelation has triggered growing concern among consumers.
PUBLISHED FEB 12, 2024
Cover Image Source: Security logo | Pexels | Photo by Pixabay
Cover Image Source: Security logo | Pexels | Photo by Pixabay

A recent incident that took place in California has brought two individuals, Noah Roskin-Frazee and Keith Latteri, into the spotlight. Accused of orchestrating a meticulously planned virtual gift card heist, the duo stands charged with defrauding a major corporation of $2.5 million. While the court papers remain discreet about the victim's identity, all signs point to tech giant Apple as the target of this elaborate scheme.

Source: GettyImages | Scott Barbour  Staff
Image Source: Getty Images | Photo by Scott Barbour Staff

The modus operandi involved exploiting vulnerabilities in the contractor's infrastructure, allowing the scammers to meticulously order gift cards and hardware. The financial gains amounted to $2.5 million and $100,000, respectively. However, the scheme extended beyond monetary theft, encompassing the resale of stolen assets to third parties. This not only defrauded the company but also impacted the customer support business contracted by the tech giant, resulting in losses running into millions.

While the court papers maintain discretion about the victim's identity, the description of "Company A" in the indictment aligns strikingly with Apple's corporate profile. Described as a corporation headquartered in Cupertino, California, involved in the development, manufacturing, licensing, support, and sale of computer software, consumer electronics, personal computers, and services, the circumstantial evidence overwhelmingly points towards Apple as the unsuspecting victim of this cybercrime.

Pexels | Plann
Image Source: Pexels | Photo by Plann

The success of Roskin-Frazee and Latteri's virtual heist can be attributed to their strategic access to key Apple backend systems. The Log Program, integral for customer support in searching and ordering replacements, and the Toolbox program, enabling edits within a limited timeframe, played crucial roles in their operation. Moreover, the third-party contractor's Jamf MDM platform, typically used for configuring Apple devices, became an unexpected tool in the crime.

Hacker silhouette typing on computer keyboard while hacking system | Pexels Photo by Anete Lusina
Image Source: Pexels | Photo by Anete Lusina

Leveraging a password reset tool on a targeted account, the scammers unearthed credentials for staff accounts with access to the company's VPN servers. Once connected to the contractor's VPN, they exploited remote desktop software, gaining control over computers in India and Costa Rica. The contractor's Jamf MDM platform facilitated access, creating a reverse SSH tunnel to the accused's Microsoft Azure account, ensuring continued remote access from December 2018 to March 2019.

Armed with legitimate credentials and VPN access, Roskin-Frazee and Latteri infiltrated what court documents describe as "Company A's Connect application." A likely reference to Apple's App Store Connect, this served as the gateway to control the Toolbox, allowing them to manipulate orders during a brief window. The alterations included extending service contracts, adding products, and audaciously changing all prices to zero.

Apple acknowledged Roskin-Frazee in a December 2023 security update, a day before his indictment. Alongside his colleague "Prof. J." of ZeroClicks Lab, he was recognized for reporting a macOS Ventura bug. 

Tim Cook at the Apple Worldwide Developer Conference | Getty Images | Justin Sullivan
Image Source: Getty Images | Photo by Justin Sullivan

The intricate web of systems exploited underscores the urgent need for fortifying backend infrastructure against sophisticated attacks. As the cybersecurity landscape continues to evolve, cases like these serve as reminders, emphasizing the need for robust security measures to safeguard against increasingly sophisticated cyber threats. The renowned tech giant, celebrated for its robust security measures, now raises concerns about the safety of its customers.

MORE ON MARKET REALIST
Seacrest expressed that the player had no way of solving the puzzle with the clues on the board.
1 day ago
Harvey had to shut every contestant up who thought it was a good answer.
1 day ago
Citing affordability as the key issue, the president announced the cap will be rolled out on Jan 20.
1 day ago
The Jonassen family finally aced the Fast Money Round, after a wait of 43 years.
2 days ago
The CRFB estimates the plan would add $5.8 trillion to the national debt over a decade.
2 days ago
Big names like Costco, Reebok, Revlon, Ray Ban, and more have filed lawsuits seeking tariff refunds.
2 days ago
It is clear what Harvey thinks will be a popular gift at the bottom of the cereal box.
2 days ago
Analysts have shared their outlook on stocks that will be in focus for 2026.
3 days ago
Harvey thought that the answer had to be on the board, and he was surprised.
3 days ago
It's safe to say that Harvey didn't think people had the habit of tidying up in the morning.
3 days ago
Harvey was a bit harsh in telling he player that he almost had no chance of winning $20,000
4 days ago
Harvey got lost in the moment and thought the contestants were yelling at him.
4 days ago
Becoming a Costco member comes with a lot of perks like great offers on premium products.
4 days ago
Health and Human Services will withhold funds to five Democratic states over suspicions of fraud.
4 days ago
A potential ruling on the legality of the sweeping tariffs may have huge implications on the economy.
4 days ago
People always tie things like big houses and fancy cars to wealth, but the little things matter more
5 days ago
The company had made use of underhanded tactics to enroll customers to its Prime program.
5 days ago
A gigantic victory for the player who had reportedly purchased their ticket online.
5 days ago
While the guest admitted she was in the antiques business, she was still astonished by the estimate.
5 days ago