Nude photos of Scarlett Johansson hacked from phone by group claiming ties to Anonymous

'Hollywood Leaks' claims responsibility; FBI investigates hacks of as many as 50 celebrities

As if to confirm that we're no better than what were apparently hordes of phone-hacking celebrity stalkers among the British press, the FBI has confirmed it is investigating a case that proves (for the second time today!) that there are pervy hackers among us.

The FBI confirmed today it is investigating who is behind the nude photos of Scarlett Johansson that showed up online this morning on gossip site Buzzfeed.com (NSFW). The photos were also reportedly sent to Perez Hilton and Mediatakeout.com.

The series of pictures, taken by the actress herself, Facebook-style with a cell-phone camera and bathroom mirror – was stolen from Johansson's cell-phone when it was hacked in March.

The FBI was already investigating hacks on other female stars, including Jessica Alba and Christina Aguilera.

Members of Johansson's staff lodged the complaint that brought the FBI in on her behalf according to a story on gossip site TMZ.com.

A hacker group that calls itself "Hollywood Leaks" claimed in a series of YouTube postings that it was responsible for the attacks and that it has amorphous connections to hactivist group Anonymous.

There was no confirmation from other sources whether there is any evidence connecting the group to the attacks, or even that the group itself exists.

It's not clear how the phones or the stars' email accounts were hacked, though several sites covering the attacks in March surmised that their passwords were weak and the hackers' password crackers were powerful. None cited any evidence for the assumption.

The story broke on TMZ.com March 17 after photos of Vanessa Hudgens were stolen from her Gmail account and showed up online.

"I can confirm that the FBI is investigating a series of computer intrusions targeting high-profile figures,," FBI spokeswoman Laura Eimiller told the Los Angeles Times. "This would include many devices—could mean a computer, desktop, laptop, iPad, cell phone…intrusions into personal online accounts too." Read more of Kevin Fogarty's CoreIT blog and follow the latest IT news at ITworld. Follow Kevin on Twitter at @KevinFogarty. For the latest IT news, analysis and how-tos, follow ITworld on Twitter and Facebook.

Top 10 Hot Internet of Things Startups
Join the discussion
Be the first to comment on this article. Our Commenting Policies