Feeds

For sale: 50,000 compromised iTunes accounts

Music and movies for pennies on the dollar

Boost IT visibility and business value

Users of a Chinese auction site are brazenly selling access to compromised iTunes accounts that offer downloads of movies and music for pennies on the dollar.

According to China's Global Times, about 50,000 pillaged iTunes accounts were up for sale on Taobao.com for as little as $5. Access to thousands of accounts has already been sold, the publication said.

Many of the offers recommend buyers use the accounts in the 12 hours immediately after the sale, presumably because the legitimate owners will catch wind of the compromise once purchases are charged to their credit cards. They also contain disclaimers from Taobao stating that the website, China's answer to eBay, isn't responsible for the items sold and can't vouch for their authenticity. In a statement sent to AFP, the online auctioneer said it wouldn't crack down on the sales until it received a formal request to do so.

It's not the first time accounts belonging to Apple users have been targeted. In July, Cupertino revamped security measures on the online store and urged users who suspected fraud to change their passwords and contact their financial institution. In 2008, several hundred MobileMe users were snared in a phishing scam that siphoned names, addresses, birth dates, email addresses and credit card numbers and sold them in underground identity theft markets.

Apple issued a statement to ITWorld that said the company is “always working to enhance account security” but outlined no action taken so far against the iTunes pillagers. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?