• 3,000 firms
  • Independent
  • Trusted
Save up to 70% on staff

News » Apple hack traces back to third-party provider

Apple hack traces back to third-party provider

Apple third-party provider
Photo from Nicholas Kamm/AFP via Getty Images

CALIFORNIA, UNITED STATES — In a significant security breach, Apple’s systems were compromised, leading to the theft of $2.5 million in gift cards and $100,000 in products. 

The culprits — a former Apple security researcher and an associate — exploited a vulnerability in the system of a customer support provider contracted by Apple.

The unnamed contractor, referred to as “Company B” in court documents, inadvertently became the hackers’ gateway to Apple’s internal network. The breach not only resulted in substantial financial losses for the contractor, estimated at over $3 million but also highlighted the risks inherent in third-party partnerships.

According to a report, the hackers used a password reset tool and the internet to access the contractor’s systems, which had direct connections to Apple’s network via a VPN. They manipulated an internal Apple database and a program called “Toolbox” to create and manage fraudulent orders.

This incident underscores the warnings cybersecurity experts have been issuing about the potential vulnerabilities third-party vendors introduce. 

Apple itself had previously acknowledged the dangers of such vulnerabilities in a December 2023 report, cautioning that hackers could exploit third-party systems to access data across multiple organizations.

In an interview with Nearshore Americas,  Lisa McStay, COO at Contiuity2, pointed out that weaker cybersecurity defenses are often found among third-party partners compared to their larger clients.

McStay added that it is essential to scrutinize the service provider’s security practices and insist on frequent security evaluations. 

Echoing this sentiment, Nic Adams, CEO of cybersecurity firm Orcus, emphasized the importance of diligent oversight and auditing of third-party partners. He advised that companies should restrict their partners’ access to systems, adopt a multi-layered security strategy, and include precise security stipulations in service agreements.

Adams also suggested that service providers should conduct regular security checks, provide continuous security training to their staff, enforce strict access controls, and maintain open communication with clients regarding security measures and any incidents that occur.

Read more here.

Start your
journey today

  • Independent
  • Free
  • Transparent

About OA

Outsource Accelerator is the trusted source of independent information, advisory and expert implementation of Business Process Outsourcing (BPO)

The #1 outsourcing authority

Outsource Accelerator offers the world’s leading aggregator marketplace for outsourcing. It specifically provides the conduit between Philippines outsourcing suppliers and the businesses – clients – across the globe.

The Outsource Accelerator website has over 5,000 articles, 450+ podcast episodes, and a comprehensive directory with 4000+ BPO companies… all designed to make it easier for clients to learn about – and engage with – outsourcing.

About Derek Gallimore

Derek Gallimore has been in business for 20 years, outsourcing for over eight years, and has been living in Manila (the heart of global outsourcing) since 2014. Derek is the founder and CEO of Outsource Accelerator, and is regarded as a leading expert on all things outsourcing.

“Excellent service for outsourcing advice and expertise for my business.”

Learn more
Banner Image
Get 3 Free Quotes Verified Outsourcing Suppliers
3,000 firms.Just 2 minutes to complete.
SAVE UP TO
70% ON STAFF COSTS
Learn more

Connect with over 3,000 outsourcing services providers.

Banner Image

Transform your business with skilled offshore talent.

  • 3,000 firms
  • Simple
  • Transparent
Banner Image