Apple and Meta reportedly fooled into giving user data to hackers — here's how

Apple Event Mar 8, 2022
Apple (Image credit: Apple)

Hackers masquerading as law enforcement officials allegedly hoodwinked Apple and Meta, goading the two tech giants to surrender user data. Citing "three people close to the matter," a Wednesday Bloomberg News report revealed the malicious actors used forged legal documents to bamboozle Apple and Meta.

According to Bloomberg, Apple and Meta surrendered "basic subscriber details," including customers' phone numbers and IP addresses. 

How the hackers allegedly fooled Apple and Meta

In mid-2021, hackers reportedly used forged Emergency Data Requests (EDRs) to obtain Apple and Meta's user data. Typically, requests for user data require a search warrant or a judge-signed subpoena, however, EDRs don't require court-ordered documents. As such, malicious hackers can bypass hawk-eyed vetting and gain access to ill-gotten data.

Cybersecurity journalist Brian Krebs called this hacking method "terrifying," but "highly effective."

"It involves compromising email accounts and websites tied to police departments and government agencies, and then sending unauthorized demands for subscriber data while claiming the information being requested can't wait for a court order because it relates to an urgent matter of life and death," Krebs said in a recent blog post.

Hacker

Hacker (Image credit: Getty)

Just as Krebs described it, Bloomberg revealed the hackers likely breached law enforcement email systems, stole templates for legitimate legal requests, forged signatures, and used them to deceive Apple and Meta. 

According to the three people cited in the Bloomberg report, a cybercriminal group called "Recursion Team" is allegedly behind the mid-2021 hack. Some cybersecurity experts believe that some of the malicious actors are also a part of Lapsus$, the cybercrime group that breached Samsung, Nvidia, Microsoft and other companies.

"Recursion Team is no longer active, but many of its members continue to carry out hacks under different names, including as part of Lapsus$," Bloomberg said.

You may be wondering, "What is 'Recursion Team' doing with the data they obtained with Apple and Meta?" Well, the hackers allegedly used the ill-gotten information to carry out harassment campaigns and financial fraud.

The question is, how do we mitigate this issue? Security specialist Nicholas Weaver told Krebs that the only way to combat counterfeit EDRs is to have the FBI serve as the sole identity provider for all state and local enforcement, but even that has drawbacks.

"How does the FBI vet in real-time that some request is really from some podunk police department?" Weave pondered.

If the FBI isn't up for the task, we hope Apple and Meta come up with stricter security protocols to handle incoming law enforcement requests. It won't be easy, but the consumers' trust depends on it.

Kimberly Gedeon

Kimberly Gedeon, holding a Master's degree in International Journalism, launched her career as a journalist for MadameNoire's business beat in 2013. She loved translating stuffy stories about the economy, personal finance and investing into digestible, easy-to-understand, entertaining stories for young women of color. During her time on the business beat, she discovered her passion for tech as she dove into articles about tech entrepreneurship, the Consumer Electronics Show (CES) and the latest tablets. After eight years of freelancing, dabbling in a myriad of beats, she's finally found a home at Laptop Mag that accepts her as the crypto-addicted, virtual reality-loving, investing-focused, tech-fascinated nerd she is. Woot!

Read more
Microsoft Copilot logo with AI sparkle symbol, "Hi, how can I help?" is written below.
Microsoft Copilot just helped me pirate Windows 11 — Here's proof
Best 16-inch laptops lede image
The 9 most outlandish computing stories of 2024
DeepSeek AI chatbot on a phone
DeepSeek jailbreakers are tricking the chatbot into bad-mouthing the Chinese government
A keyboard with a button that says "SCAM?"
A years-long scam that began with fake Windows pop-ups ends with PayPal payments
Apple HomePod
Amazon's Alexa privacy U-turn just made this Apple rumor all the more exciting
DeepSeek whale logo in the style of the TikTok logo.
The DeepSeek mania proves it's finally — finally! — time to talk about AI privacy
Latest in Antivirus & Cyber-security
TP-Link routers targeted by Chinese state-sponsored cyber attacks
TP-Link routers may face nationwide ban after 'significantly alarming' link to US cyberattacks
What is a VPN kill switch — and why you should use one
You need a VPN for school, here are 3 services we recommend
The AMD Ryzen and NVIDIA RTX stickers on the Acer Nitro 17
'You basically have to throw your computer away': Researchers explain AMD 'Sinkclose' vulnerability, but do you need to worry?
Google Search
This malware is posing as Google Authenticator using Google ads — here's how to protect yourself
Windows 10 BSOD saying "It's not you, it's me."
Microsoft reveals CrowdStrike outage could have a surprising long-term impact on everyday users
MANILA, PHILIPPINES - JULY 19: Long queues of passengers form at the check-in counters at Ninoy Aquino International Airport, amid a global IT disruption caused by a Microsoft outage and a Crowdstrike IT problem, on July 19, 2024 in Manila, Philippines. A significant global outage affecting Microsoft services, particularly Microsoft 365, has caused widespread disruptions across various sectors, including airlines, banks, and health systems. The outage was attributed to a glitch in CrowdStrike's "Falcon Sensor" software, which impacted Windows systems, leading to thousands of flight cancellations and operational chaos in multiple industries. Microsoft has reported that the underlying cause of the outage has been fixed, but residual effects continue to impact some users as the company works on full recovery. (Photo by Ezra Acayan/Getty Images)
The CrowdStrike outage spotlights major vulnerabilities in the global information ecosystem
Latest in News
A close-up of a light-colored computer keyboard shows the keys T, Y, G, and H replaced by the logos of OpenAI, DeepSeek, Grok, and Gemini, the leading competitors in the artificial intelligence market. This serves as a visual metaphor for the intense rivalry and innovation in the AI industry. (Photo by Matteo Della Torre/NurPhoto via Getty Images)
Is generative AI inadvertently reducing the voices of many to the banality of one?
Asus ROG Ally Z1 on a brown table with the game Unpacking played on screen.
Handheld gaming PCs have a Windows problem — but maybe not for long
WWDC 2025 could mark the beginning of the end for certain iPhone users
Error when installing Google Chrome on the Asus Vivobook 16 Flip, on a white desk against a blue background.
"This app can't run on your PC": Google's Chrome Installer broke on Windows, but there's a fix
Nintendo Switch 2 handheld gaming console
Nintendo Switch 2 preorder date: It might be a lot closer than you think, say tipsters
Microsoft Surface Laptop (7th Edition, 2024)
Windows-on-Arm woes: Amazon warns customers about Surface laptop returns