Kerem Albayrak, 22, of north Ld, pleaded guilty to a blackmail count in a Southwark Crown Court December 2, and had previously admitted two counts related to "unauthorized acts intended to hinder operati or prevent / hinder access to a computer". . "Last Friday, the court imposed a two-year suspended pris sentence Albayrak, as well as a 300-hour volunteer work order and a six-mth electric curfew.
The blackmail attempt took place in March 2017, by a group called "Turkish Crime Family". According to the UK Natial Crime Agency, which investigated the crime in collaborati with the American authorities, Albayrak was the spokespers for the group of hackers.
The group has threatened Apple to reset the factory settings of 319 milli iCloud accounts, as well as to empty the databases collected line if demand is not met. After ctacting Apple Security with the initial threat and not receiving an adequate respse within a week, he doubled the demand to $ 75,000 in cryptocurrency or 1,000 iTunes gift cards by $ 100.
Albayrak also created a YouTube video where he accessed two seemingly random iCloud accounts as evidence, which was sent to Apple as well as to the media. A small collecti of UK-based iCloud accounts was also provided to the media for verificati.
Albayrak was arrested and a search of the seized aircraft cfirmed his involvement in the group. In a cversati, the hacker boasted to the rest of the group that "the attack will happen 99.9%. Even if it doesn't, you're still going to attract a LOT media attenti ".
He then explained to investigators the need for fame. "When you have power the Internet, it's like glory, and everye respects you," said Albayrak. "Everye is chasing after that."
"Albayrak mistakenly believed that he could escape justice after hacking two accounts and trying to blackmail a large multinatial," said Anna Smith, an NCA senior investigator. "During the investigati, it became clear that he was looking for fame and fortune. But cybercrime does not pay."
At the time of the blackmail attempt, Apple said its systems were not compromised, with the NCA investigati cfirming that there were no signs of a violati. Albayrak had data that could be used in an attack, but it was collected from breaches of third-party services, and most of the accounts were inactive.
In emails sent by the Turkish Crime Family group to …