we have received hacked iCloud account from the Turkish Crime family and after checking them we found the hacked iCloud accounts are legitimate and we found sensitive information about the victims.we are securing the privacy of these victim as the data is with us and with the hackers only till yet.Apple has to be now think about the users of the iCloud and solve the issue as soon as possible.if the some users will change the passwords but the there are million of the users who are been victim of this cyber attack .
we are again mentioning that the hackers are provided these details so that we can belive that hacked data is legitimate and apple and hackers will solve the issue as soon as possible to protect the user’s privacy .
Read Previous Updates About hackers
Apple has now announced that they were not breached which no one claimed they were other than some journalists who misunderstood the situation, they announced this for their user’s comfort & to make them feel better about their selves as they’re very insecure with their company.They have basically announced what we have told them which is that there was no breach, this has nothing to do with a breach.The whole “thing” not being a breach doesn’t change any claims that were made by us, the entire DB was acquired and built from multiple DB’s that we have been selling in the past 5 years as we decided to keep all our @icloud.com, @me.com & mac.com domains due to those domains not having a popular demand in the cracking community.More and more people started getting involved after all the press release world wide, these people have been providing us even more databases which we did not already have, this is bumping up the total number of active iCloud accounts we have to reset.We are still strengthening our infrastructure and acquiring more servers for the attack– We’re still in contact with Apple.The total number of unhashed DB lines we currently hold with only Apple owned extensions are over 750 million, out of the 750 million we have 250 million that are checked and working live, there is still a big amount that we’re still scanning.How did we get such a high hit % ratio on the lists which some of them are pretty old?Most of DB’s that we’ve listed online have not included any of the extensions that we provided above due to not being enough demand.We later on capitalized the first letter of the entire databases passwords and rescanned them which gave us a ton more than what we actually had from the first scan as Apple requires its users to do so when registering with Apple ID, so we then decided to do the same thing but with the last letter of the passwords. This gave us even moreA breach means nothing in 2017 when you can just pull the exact same user information in smaller scales through companiesthat aren’t as secure
We believe the number of active credentials we have will keep on growing until the day of attack which is 7 April 2017