Stay up to date with notifications from The Independent

Notifications can be managed in browser preferences.

iCloud leak hacker who stole Jennifer Lawrence nude photos sentenced to prison

The iCloud attack caught up hundreds of victims

Andrew Griffin
Thursday 30 August 2018 08:28 BST
Comments
Jennifer Lawrence attends "The Hunger Games: Mockingjay- Part 2" New York Premiere at AMC Loews Lincoln Square 13 theater on November 18, 2015
Jennifer Lawrence attends "The Hunger Games: Mockingjay- Part 2" New York Premiere at AMC Loews Lincoln Square 13 theater on November 18, 2015 (Jamie McCarthy/Getty Images)

The man who hacked into hundreds of iCloud accounts of Hollywood stars and others before leaking their nude photos across the internet has been sentenced.

Connecticut man George Garafano became infamous when he stole private photos from people including Jennifer Lawrence and made them available across the internet.

He was sentenced to eight months in prison this week, in federal court in Bridgeport. After prison, he must serve three years of supervised release and perform 60 hours of community service.

He was one of four men arrested after the 2014 hacking scandal.

The hack became infamous because of the celebrities it hit: Jennifer Lawrence, Kirsten Dunst, Kate Upton and a range of other famous people had their photos stolen and leaked across the web. But it hit normal internet users, too, and Garofano was accused of stealing photos and private information from 240 people.

Garafano pleaded guilty in April, when he asked for leniency from a judge.

He admitted he had posed as a member of Apple's security staff and sent messages claiming that he needed to get hold of their usernames and passwords. When people replied to those authentic-looking messages with their login information, he broke into their iCloud accounts and stole their photos and other private information.

Jennifer Lawrence has referred to the attack as being equivalent to a sex crime and has called for harsher sentenced for those convicted of such behaviour. The 2014 hack also helped lead the push for other kinds of security tools, such as two-factor authentication, which are intended to ensure that only the person who really owns the account can log into it.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in