He became a star. A unstoppable and totally unknown, with around a hundred attacks against more than 400 companies. We do not know his age, whether he is very young or a war veteran. scene on the Deepweb, he is solely responsible for many recent data breaches affecting some of the largest and most important technology companies on the planet.
The only thing known about this “black hat” hacker – a type of hacker focused on exploiting security vulnerabilities to obtain confidential information, cause damage or obtain personal gain – is the data that he himself provided: that He is Serbian and lives in Russia.
Active since October 2022 – although it only became popular after its attack on the Asian supermarket chain Weee -, initially! It was suspected that it was not a single person, but a highly qualified Iranian team.
2024 is your year
Pareekh Consulting’s chief analyst, Pareekh Jain, previously said that we were dealing with someone who had “years of advantage” and that the way he operated gave him “a head start even on government and law enforcement websites.” The frame was one of his most popular attacks, that perpetrated against Europolthe agency based in The Hague (Netherlands) created for the prevention and fight against cybercrime and terrorism on an international scale.
And to understand the scale, it is worth going back a few months: in March 2024, he and another colleague hacked Pandabuy, the famous shipping agency based in China. In April 2024 hacked several databases of Acuity, a major government technology contractor A few days later, in May 2024, it took a giant step forward by accessing 9,128 confidential Europol files.
But its popularity increased when in June 2024 managed to obtain the source code of several internal Apple tools
What tools did IntelBroker steal from Apple
In a comprehensive analysis published by cybersecurity consultancy AHCTS, IntelBroker apparently managed to gain access to a series of “proprietary internal plugins and settings” by Apple that are used “to connect Apple’s proprietary authentication systems to Atlassian Jira and Confluence, single sign-on in Apple’s corporate network.
This has many serious implications: accessing these collaborative software tools This can mean ways to break security and compromise the devices of millions of users.
Of course, Apple IntelBroker ID is currently suspendedeven though it already boasts of having obtained the source code of three tools widely used by Apple: AppleConnect-SSO, Apple-HWE-Confluence-Advanced and AppleMacroPlugin. It is still early to know the extent of the gap, but it is obvious that Apple will have to implement measures to avoid possible future damage, by modifying or rewriting part of the tools used or switching to d other services that work similarly with user IDs.
Cover | Composition of the profile image that IntelBroker uses in networks with professional photography by Arif Riyanto (Unsplash)
In Applesfera | At just 22 years old, he hacked thousands of iPhones and blackmailed Apple. Today he has become a director of companies against financial fraud
In Applesfera | He hacked the iPhone and Apple hired him as an intern. A few months later, he was fired for not responding to an email.