ECONOMY & WORK
MONEY 101
NEWS
PERSONAL FINANCE
NET WORTH
About Us Contact Us Privacy Policy Terms of Use DMCA Opt-out of personalized ads
© Copyright 2023 Market Realist. Market Realist is a registered trademark. All Rights Reserved. People may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.
MARKETREALIST.COM / NEWS

Cybersecurity Researchers Charged with $2.5 Million Virtual Gift Card Fraud Against 'Apple'

The recent revelation has triggered growing concern among consumers.
PUBLISHED FEB 12, 2024
Cover Image Source: Security logo | Pexels | Photo by Pixabay
Cover Image Source: Security logo | Pexels | Photo by Pixabay

A recent incident that took place in California has brought two individuals, Noah Roskin-Frazee and Keith Latteri, into the spotlight. Accused of orchestrating a meticulously planned virtual gift card heist, the duo stands charged with defrauding a major corporation of $2.5 million. While the court papers remain discreet about the victim's identity, all signs point to tech giant Apple as the target of this elaborate scheme.

Source: GettyImages | Scott Barbour  Staff
Image Source: Getty Images | Photo by Scott Barbour Staff

The modus operandi involved exploiting vulnerabilities in the contractor's infrastructure, allowing the scammers to meticulously order gift cards and hardware. The financial gains amounted to $2.5 million and $100,000, respectively. However, the scheme extended beyond monetary theft, encompassing the resale of stolen assets to third parties. This not only defrauded the company but also impacted the customer support business contracted by the tech giant, resulting in losses running into millions.

While the court papers maintain discretion about the victim's identity, the description of "Company A" in the indictment aligns strikingly with Apple's corporate profile. Described as a corporation headquartered in Cupertino, California, involved in the development, manufacturing, licensing, support, and sale of computer software, consumer electronics, personal computers, and services, the circumstantial evidence overwhelmingly points towards Apple as the unsuspecting victim of this cybercrime.

Pexels | Plann
Image Source: Pexels | Photo by Plann

The success of Roskin-Frazee and Latteri's virtual heist can be attributed to their strategic access to key Apple backend systems. The Log Program, integral for customer support in searching and ordering replacements, and the Toolbox program, enabling edits within a limited timeframe, played crucial roles in their operation. Moreover, the third-party contractor's Jamf MDM platform, typically used for configuring Apple devices, became an unexpected tool in the crime.

Hacker silhouette typing on computer keyboard while hacking system | Pexels Photo by Anete Lusina
Image Source: Pexels | Photo by Anete Lusina

Leveraging a password reset tool on a targeted account, the scammers unearthed credentials for staff accounts with access to the company's VPN servers. Once connected to the contractor's VPN, they exploited remote desktop software, gaining control over computers in India and Costa Rica. The contractor's Jamf MDM platform facilitated access, creating a reverse SSH tunnel to the accused's Microsoft Azure account, ensuring continued remote access from December 2018 to March 2019.

Armed with legitimate credentials and VPN access, Roskin-Frazee and Latteri infiltrated what court documents describe as "Company A's Connect application." A likely reference to Apple's App Store Connect, this served as the gateway to control the Toolbox, allowing them to manipulate orders during a brief window. The alterations included extending service contracts, adding products, and audaciously changing all prices to zero.

Apple acknowledged Roskin-Frazee in a December 2023 security update, a day before his indictment. Alongside his colleague "Prof. J." of ZeroClicks Lab, he was recognized for reporting a macOS Ventura bug. 

Tim Cook at the Apple Worldwide Developer Conference | Getty Images | Justin Sullivan
Image Source: Getty Images | Photo by Justin Sullivan

The intricate web of systems exploited underscores the urgent need for fortifying backend infrastructure against sophisticated attacks. As the cybersecurity landscape continues to evolve, cases like these serve as reminders, emphasizing the need for robust security measures to safeguard against increasingly sophisticated cyber threats. The renowned tech giant, celebrated for its robust security measures, now raises concerns about the safety of its customers.

MORE ON MARKET REALIST
Carey suffered a similar snafu a few months ago while playing the same game of 'Bullseye'.
8 hours ago
Fans also share some tips that could've helped Bain win the bonus round but it was too late.
9 hours ago
Emily Croke coincidentally got the question related to her great-great aunt, Emily Folger.
10 hours ago
Luckily for the veteran host, no one in the studio caught the mistake on time.
11 hours ago
The executive producer of the show, Michael Davies later apologized for the spoiled show.
12 hours ago
Even the seasoned expert was stumped by the unusual subject of the painting.
13 hours ago
In the end, Mr Wonderful cut off Greiner with a deal that the founder of Wad Free couldn't refuse.
1 day ago
Seacrest got geniunely spooked as he couldn't figure out who played a prank on him.
1 day ago
The seller brought some "Secret Service" memorabilia of former Attorney General J. Howard McGrath.
1 day ago
The guest was already emotional because of the backstory involving native Alaskans.
2 days ago
The player once again fumbled a puzzle despite moving forward in the game.
2 days ago
The host didn't want to get more of the weird answers on the show anymore.
2 days ago
The founder of Beyond Sushi impressed the Sharks with 100% plant based flavors.
2 days ago
The Shark jumped back in to the deal as he thought his wife would love the product.
3 days ago
The guest who bought the item at a charity store had no idea that it was over 3,000 years old.
3 days ago
When the rare coin showed up on Harrison's table, he had to take his old man's approval for the deal.
4 days ago
Fans said that such behavior was unnecessary and slammed the antics as self-congratulatory.
4 days ago
Several customers took to social media to complain about spoilt milk that they purchased from the store.
4 days ago
Despite the massive appraisal, the brothers shared that they would never sell their collection.
4 days ago
Harrison is often impressed by suits belonging to legendary musicians or actors.
4 days ago