Ransomware Hackers Leak Schematics for New MacBook Pro Confirming MagSafe, HDMI, SD Card Slot
LIKE
TWEET
SHARE
PIN
SHARE
POST
MAIL
MORE
Posted April 21, 2021 at 9:31pm by iClarified
The ransomware hacking group REvil has leaked schematics for the new iMac and the unreleased MacBook Pro. The schematics were obtained from Apple manufacturer Quanta.
Quanta has apparently refused to pay the ransom demanded by REvil.
In order not to wait for the upcoming Apple presentations, today we, the REvil group, will provide data on the upcoming releases of the company so beloved by many.Tim Cook can say thank you Quanta.From our side, a lot of time has been devoted to solving this problem. Quanta has made it clear to us that it does not care about the data of its customers and employees, thereby allowing the publication and sale of all data we have.
The hackers now say they will release confidential drawings and data each day until a $50 million ransom is paid.
Our team is negotiating the sale of large quantities of confidential drawings and gigabytes of personal data with several major brands. We recommend that Apple buy back the available data by May 1. More and more files will be added every day.
In January, Bloomberg revealed codenames J314 and J316 for the upcoming 14-inch and 16-inch MacBook Pro. Those codenames have been confirmed by the leak. Additionally, the schematics corroborate reports that the 16-inch MacBook Pro will feature a MagSafe charging port, HDMI out, and an SD card slot.
Given the threats to ordinary computer users everywhere, the fact that iClarified is rewarding these hackers, encouraging Apple and others companies to pay these ransoms is reprehensible! They should be ashamed of yourselves, especially since it won’t be long before iCarified’s site and computers are hacked!
I think you’re misreading the article. iClarified isn’t encouraging anything. The italicized portions are the quotes from the hackers. They’re not what iClarified is suggesting.
At this point, a threat has been made.. wouldn’t the the targets best action be to hire someone to hunt down and apprehend or stop the aggressor? Even at a fraction of the ransom price, some of the top mercenaries in the world could be hired to carry out this task of eliminating the threat.