Apple has begun reassuring its customers that their systems have not had any breaches after a hacker, or multiple hackers, have threatened to wipe out millions upon millions of iPhones remotely. The data affected would include photos, messaged, videos, and more.
The hackers say they will allegedly use a cache of email accounts along with their passwords that were stolen as collateral in their attempt to try to extort the world’s highest-valued corporation. They also made claims that they are able to access as much as 559 million iCloud and Apple email accounts, reported Vice’s blog Motherboard on Tuesday.
The group, who call themselves the “Turkish Crime Family,” stated that it may delete the alleged list containing compromised login details after Apple pays them only $75,000 in one type of cryptocurrency, either Ether or Bitcoin, or around $100,000 worth in iTunes vouchers, reported Motherboard.
The hackers gave Apple until April 7 of this year to meet their demands.
Although Apple did not officially confirm the legitimacy of the reported data that these hackers say they obtained, one Apple spokesperson said to Fortune in a recent statement that, even if the list turned out to be authentic, it definitely had not been obtained through a hack of the company.
Fortune’s tech newsletter, Get Data Sheer, reported:
“There have not been any breaches in any of Apple’s systems including iCloud and Apple ID,” the spokesperson said. “The alleged list of email addresses and passwords appears to have been obtained from previously compromised third-party services.”
The chance of a massive remote wipe-out of Apple iPhone data isn’t known, yet there may be reason to be somewhat skeptical. The spokesperson for Apple said that the company is ” actively monitoring to prevent unauthorized access to user accounts and are working with law enforcement to identify the criminals involved. To protect against these type of attacks, we always recommend that users always use strong passwords, not use those same passwords across sites and turn on two-factor authentication.”