ECONOMY & WORK
MONEY 101
NEWS
PERSONAL FINANCE
NET WORTH
About Us Contact Us Privacy Policy Terms of Use DMCA Opt-out of personalized ads
© Copyright 2023 Market Realist. Market Realist is a registered trademark. All Rights Reserved. People may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.
MARKETREALIST.COM / NEWS

Cybersecurity Researchers Charged with $2.5 Million Virtual Gift Card Fraud Against 'Apple'

The recent revelation has triggered growing concern among consumers.
PUBLISHED FEB 12, 2024
Cover Image Source: Security logo | Pexels | Photo by Pixabay
Cover Image Source: Security logo | Pexels | Photo by Pixabay

A recent incident that took place in California has brought two individuals, Noah Roskin-Frazee and Keith Latteri, into the spotlight. Accused of orchestrating a meticulously planned virtual gift card heist, the duo stands charged with defrauding a major corporation of $2.5 million. While the court papers remain discreet about the victim's identity, all signs point to tech giant Apple as the target of this elaborate scheme.

Source: GettyImages | Scott Barbour  Staff
Image Source: Getty Images | Photo by Scott Barbour Staff

The modus operandi involved exploiting vulnerabilities in the contractor's infrastructure, allowing the scammers to meticulously order gift cards and hardware. The financial gains amounted to $2.5 million and $100,000, respectively. However, the scheme extended beyond monetary theft, encompassing the resale of stolen assets to third parties. This not only defrauded the company but also impacted the customer support business contracted by the tech giant, resulting in losses running into millions.

While the court papers maintain discretion about the victim's identity, the description of "Company A" in the indictment aligns strikingly with Apple's corporate profile. Described as a corporation headquartered in Cupertino, California, involved in the development, manufacturing, licensing, support, and sale of computer software, consumer electronics, personal computers, and services, the circumstantial evidence overwhelmingly points towards Apple as the unsuspecting victim of this cybercrime.

Pexels | Plann
Image Source: Pexels | Photo by Plann

The success of Roskin-Frazee and Latteri's virtual heist can be attributed to their strategic access to key Apple backend systems. The Log Program, integral for customer support in searching and ordering replacements, and the Toolbox program, enabling edits within a limited timeframe, played crucial roles in their operation. Moreover, the third-party contractor's Jamf MDM platform, typically used for configuring Apple devices, became an unexpected tool in the crime.

Hacker silhouette typing on computer keyboard while hacking system | Pexels Photo by Anete Lusina
Image Source: Pexels | Photo by Anete Lusina

Leveraging a password reset tool on a targeted account, the scammers unearthed credentials for staff accounts with access to the company's VPN servers. Once connected to the contractor's VPN, they exploited remote desktop software, gaining control over computers in India and Costa Rica. The contractor's Jamf MDM platform facilitated access, creating a reverse SSH tunnel to the accused's Microsoft Azure account, ensuring continued remote access from December 2018 to March 2019.

Armed with legitimate credentials and VPN access, Roskin-Frazee and Latteri infiltrated what court documents describe as "Company A's Connect application." A likely reference to Apple's App Store Connect, this served as the gateway to control the Toolbox, allowing them to manipulate orders during a brief window. The alterations included extending service contracts, adding products, and audaciously changing all prices to zero.

Apple acknowledged Roskin-Frazee in a December 2023 security update, a day before his indictment. Alongside his colleague "Prof. J." of ZeroClicks Lab, he was recognized for reporting a macOS Ventura bug. 

Tim Cook at the Apple Worldwide Developer Conference | Getty Images | Justin Sullivan
Image Source: Getty Images | Photo by Justin Sullivan

The intricate web of systems exploited underscores the urgent need for fortifying backend infrastructure against sophisticated attacks. As the cybersecurity landscape continues to evolve, cases like these serve as reminders, emphasizing the need for robust security measures to safeguard against increasingly sophisticated cyber threats. The renowned tech giant, celebrated for its robust security measures, now raises concerns about the safety of its customers.

MORE ON MARKET REALIST
What is Judy Sheindlin’s salary per episode? Here’s what we know about the TV judge and her new IMDb TV show, ‘Judy Justice.’
12 hours ago
Sajak was criticized by fans on the internet but the contestant clarified that it was just for fun.
13 hours ago
Danielle Perez had gone viral after talking about the awkward moment on "The Price is Right" on social media.
1 day ago
The singer also got Malone's number but is only focusing on sharing his work with him for now.
1 day ago
The incident did not bring down the woman's excitement as she kept jumping on stage.
1 day ago
The guest had no idea whose face was engraved on the top of the box and how much it cost.
2 days ago
The young entrepreneur saw a common problem kids his age faced and came up with an invention.
2 days ago
It was a gift from the father of his first client to whom he had sold a condo.
2 days ago
The singer wanted to celebrate his journey by sending fans to the place linked to his early days.
2 days ago
Wait till you hear the list of weird prizes that 'Price is Right' gave in the '50s.
3 days ago
The bottled water from the popular retailer has nanoplastic particles more than the firm's limits.
3 days ago
Most of the sharks had concerns about water pressure even though the product impressed them.
3 days ago
The host wanted to be sure about the signature that added a lot of value to the doll and the cards.
4 days ago
The incident took place on a busy Friday night and the staff failed to keep track of the group.
4 days ago
Some users also told her to just sell the car back and take cash for it instead of just paying taxes.
5 days ago
The man was initially convinced that there was a gold nugget inside the rock but he just couldn't crack it.
5 days ago
The question may not have been suggestive but fans read between the lines and interpreted it their way.
5 days ago
Sajak acknowledged that his farewell was robbing the players of time and winning opportunities.
5 days ago
The user finally decided to spend what he found on a camera and still had $500 left.
5 days ago
The guest made it clear that he intended to hold on to the precious instrument for life.
6 days ago