Virginia Teacher Sentenced to 34 Months in Prison for 2014 Celebrity iCloud Hack

iCloud AltFor his role in the 2014 iCloud hacks that saw many celebrity photos illicitly shared on the internet, former high school teacher Christopher Brannan has been sentenced to 34 months in prison, according to the U.S. Attorney's Office for the Eastern District of Virginia (via AppleInsider).

Brannan was charged with unauthorized access to a protected computer and aggravated identity theft. Court documents say that he accessed the ‌iCloud‌, Yahoo, Facebook, and email accounts of more than 200 victims, both celebrities and non-celebrities.

He was able to obtain full ‌iCloud‌ backups, photographs, and other information using phishing email accounts that were designed to look like legitimate emails from Apple. He also hacked email accounts by answering security questions using data found on victims' Facebook accounts.

After obtaining Apple account information, Brannan would search for "sensitive and private photographs and videos, including nude photographs."

Brannan is one of multiple people who were found accessing and distributing celebrity photos in the 2014 attack. Ryan Collins, Edward Majerczyk, and Emilio Herrera, and George Garafano have previously been sentenced to prison terms ranging from eight months to 18 months.

When hundreds of nude celebrity photos began leaking on the internet in 2014 as part of what's now known as the "Celebgate" attack, there was initial speculation that ‌iCloud‌ had been hacked.

Following an investigation, however, Apple found that the accounts in question were compromised by weak passwords and skilled phishing attempts.

Apple has since implemented multiple changes to ‌iCloud‌ security, adding two-factor authentication to iCloud.com, introducing email alerts when an ‌iCloud‌ account is accessed either on the web or on another device, and requiring app-specific passwords for third-party apps that access ‌iCloud‌.

Unfortunately, the kind of phishing emails that led to the 2014 celebrity leak are still widely used today, and phishing scammers have only gotten better at what they do.

To thwart phishing attempts, Apple maintains a support page with information on how to avoid fake support calls, phishing emails, and other scam techniques that malicious individuals employ to extract information from Apple users.

Those concerned about being the victim of a phishing attack should take measures to stay safe, including using two-factor authentication, getting a password manager like 1Password and using a unique password for each and every site, and avoiding suspicious phone calls and emails, even if they look like they come from Apple.

Popular Stories

iOS 26

iOS 26.4 and iOS 27 Features Revealed in New Leak

Friday December 12, 2025 10:56 am PST by
Macworld's Filipe Espósito today revealed a handful of features that Apple is allegedly planning for iOS 26.4, iOS 27, and even iOS 28. The report said the features are referenced within the code for a leaked internal build of iOS 26 that is not meant to be seen by the public. However, it appears that Espósito and/or his sources managed to gain access to it, providing us with a sneak peek...
apple beta 26 lineup

Apple Leak Confirms Work on Foldable iPhone, AirTag 2, and Dozens More Devices

Monday December 15, 2025 2:05 pm PST by
Last week, details about unreleased Apple devices and future iOS features were shared by Macworld. This week, we learned where the information came from, plus we have more findings from the leak. As it turns out, an Apple prototype device running an early build of iOS 26 was sold, and the person who bought it shared the software. The OS has a version number of 23A5234w, and the first...
Apple Logo Top Half

Early iOS 26 Software Leak Uncovers Dozens of Upcoming Apple Features

Monday December 15, 2025 3:05 pm PST by
Software from an iPhone prototype running an early build of iOS 26 leaked last week, giving us a glimpse at future Apple devices and iOS features. We recapped device codenames in our prior article, and now we have a list of some of the most notable feature flags that were found in the software code. In some cases, it's obvious what the feature flags are referring to, while some are more...
Apple Foldable Thumb

Leak Reveals Foldable iPhone Details

Monday December 15, 2025 9:09 am PST by
The first foldable iPhone will feature a series of design and hardware firsts for Apple, according to details shared by the Weibo leaker known as Digital Chat Station. According to a new post, via machine translation, Apple is developing what the leaker describes as a "wide foldable" device, a term used to refer to a horizontally oriented, book-style foldable with a large internal display....
iOS 26

Apple Releases iOS 26.2 With Alarms for Reminders, Lock Screen Changes, Enhanced Safety Alerts and More

Friday December 12, 2025 10:10 am PST by
Apple today released iOS 26.2, the second major update to the iOS 26 operating system that came out in September, iOS 26.2 comes a little over a month after iOS 26.1 launched. ‌iOS 26‌.2 is compatible with the ‌iPhone‌ 11 series and later, as well as the second-generation ‌iPhone‌ SE. The new software can be downloaded on eligible iPhones over-the-air by going to Settings >...
iOS 26

iOS 26.2 Coming Soon With These 8 New Features on Your iPhone

Thursday December 11, 2025 8:49 am PST by
Apple seeded the second iOS 26.2 Release Candidate to developers earlier this week, meaning the update will be released to the general public very soon. Apple confirmed iOS 26.2 would be released in December, but it did not provide a specific date. We expect the update to be released by early next week. iOS 26.2 includes a handful of new features and changes on the iPhone, such as a new...
macOS Tahoe 26 Thumb

Apple Releases macOS Tahoe 26.2 With Edge Light

Friday December 12, 2025 10:08 am PST by
Apple today released macOS Tahoe 26.2, the second major update to the macOS Tahoe operating system that came out in September. macOS Tahoe 26.2 comes five weeks after Apple released macOS Tahoe 26.1. Mac users can download the macOS Tahoe update by using the Software Update section of System Settings. macOS Tahoe 26.2 includes Edge Light, a feature that illuminates your face with soft...
airpods max 2024 colors

AirPods Max 2 Likely to Offer These 10 New Features

Monday December 15, 2025 7:41 am PST by
Apple released the AirPods Max on December 15, 2020, meaning the over-ear headphones launched five years ago today. While the AirPods Max were updated with a USB-C port and new color options last year, followed by support for lossless audio and ultra-low latency audio this year, the headphones lack some of the features that have been introduced for newer generations of the regular AirPods and the ...

Top Rated Comments

ipedro Avatar
89 months ago
It was not a hack. You should know better, this is a tech website. We have a hard enough time correcting the misconception that iCloud was hacked (it wasn’t), we don’t need Macrumors reinforcing it.

This was social engineering, phishing celebrities into giving up their passwords voluntarily.
Score: 28 Votes (Like | Disagree)
zorinlynx Avatar
89 months ago
Ah, yes. The “Fappening”!
I know, right? I'm not sure why the post called it "Celebgate". I've never heard it called that! It's always been "The Fappening".
Score: 25 Votes (Like | Disagree)
MagicBoy Avatar
89 months ago
Since when was it called Celebgate? I'm told the torrent file was called "The Fappening".
Score: 17 Votes (Like | Disagree)
johnalan Avatar
89 months ago
What a way to treat a national treasure.
Score: 17 Votes (Like | Disagree)
Fortimir Avatar
89 months ago
"...as part of what's now known as the "Celebgate" attack."

Stop trying to make "Celebgate" happen. It's not going to happen.
Score: 17 Votes (Like | Disagree)
JimmyHook Avatar
89 months ago
There has never been a hack of iCloud period. The law requires any hacks be reported, none have, therefore iCloud is still the most secure cloud service in existence
[doublepost=1551468630][/doublepost]
If they're storing passwords correctly, how would they know that?
By asking the account owners during an investigation is the most likely answer
Score: 16 Votes (Like | Disagree)