Ransomware gang mysteriously drops threat to leak Apple MacBook data

The data has been removed from REvil’s dark web blog

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

The infamous REvil hacking group has allegedly dropped all references to a ransomware attack againstApplesupplier Quanta Computer from its dark web blog.

REvil last weekclaimed to have accessed obtained images and schematics of unreleased Apple products, including the company’s next-generationMacBooks, after accessing the internal computers of Taiwan-based Quanta.

The group posted 21 screenshots depicting MacBook schematics as proof of the breach and threatened to publish new data every day leading up to May 1 unless a $50 million ransom demand was paid.

Quanta reportedly refused to pay the ransom to reclaim the stolen data and as a result, the hackers decided to extortAppleinstead.

However,MacRumoursreports that the hacking group has removed all references to the extortion attempt, which was timed to coincide with Apple’s ‘Spring Loaded event’ where the company announced its firstM1 iMac.

What’s more, no additional stolen documents have been leaked online since the original demand was made public, according to the MacRumours report.

It’s currently unclear why REvil - which typically follows through with its threats of publishing confidential documents - has seemingly dropped the threat against Apple, and it remains to be seen whether the ransom demand was paid.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Apple has yet to comment publicly on the alleged breach, although Quanta has confirmed that its servers were breachedin a statement toBloomberg.

“Quanta Computer’s information security team has worked with external IT experts in response to cyber attacks on a small number of Quanta servers, a spokesperson said, adding that “there’s no material impact on the company’s business operation” as a result of the hack.

Via:Tom’s Hardware

Carly Page is a Freelance journalist, copywriter and editor specialising in Consumer/B2B technology. She has written for a range of titles including Computer Shopper, Expert Reviews, IT Pro, the Metro, PC Pro, TechRadar and Tes.

This new phishing strategy utilizes GitHub comments to distribute malware

Should your VPN always be on?

NYT Strands today — hints, answers and spangram for Sunday, November 10 (game #252)