Chapter
How hackers target celebrity accounts
Hackers would scour the celebrity social media accounts looking for possible answers to account recovery questions, search online databases, and even attempt to trade unreleased nude photos for more in order to get access to the iCloud account.
Clips
The podcast discusses how hackers use various techniques like social media searching and database scanning to find celebrities' email addresses and determine their phone types.
30:34 - 33:18 (02:43)
Summary
The podcast discusses how hackers use various techniques like social media searching and database scanning to find celebrities' email addresses and determine their phone types. Such leaked photos are then privately traded and sometimes posted on platforms like Stol, which is dedicated to uploading stolen nude photos of women.
ChapterHow hackers target celebrity accounts
EpisodeEp 34: For Your Eyes Only
PodcastDarknet Diaries
Hackers use various methods such as phishing emails and social media to gain access to celebrity iCloud accounts.
33:18 - 38:03 (04:45)
Summary
Hackers use various methods such as phishing emails and social media to gain access to celebrity iCloud accounts. Once they have access, they can view all of the photos on the account and potentially use them for malicious purposes.