New Details Emerge on Security Researcher Potentially Responsible for Dev Center Outage

Early this morning, independent security researcher Ibrahim Balic speculated that he may be responsible for the security breach that caused an extended outage of Apple's Developer Center, which has been offline since late last week.

Despite Balic's claim that he reported his findings directly to Apple and did not intend to act maliciously, information that he gave in an interview with TechCrunch suggests somewhat questionable behavior.

Balic, who has reported 13 different bugs to Apple, originally discovered an iAd Workbench vulnerability on June 18 that allowed a request sent to the server to be manipulated. This security hole could be used to acquire the names and email addresses of iTunes users (even non-developers). After finding the loophole, Balic wrote a Python script to harvest data from the vulnerability and then displayed it in a YouTube video, which may have put him on Apple's radar.

balicbugs

A screenshot of Balic's submitted bug reports. Click to enlarge.

In addition to the iAd Workbench bug, Balic also discovered and submitted a report on a bug that caused the Dev Center site to be vulnerable to a stored XSS attack. While Balic says that it was possible to access user data by exploiting the Dev Center issue, he claims that he did not do so. According to TechCrunch, Balic's YouTube video (which has since been removed) contained full names and email addresses, and it is unclear where they originated.

It's too bad, though, that the video seemed so definitive: After showing off images of Apple's downed Dev Center and the company's official response, Balic then showed a slew of files that seem to contain full names and email addresses. It seems pretty damning, but Balic says that he never went after the Developer Center site directly, and all that user information he highlighted came from the iAd Workbench. Two separate bugs paved the way for one very confusing video.

Balic claims that he harvested data on 73 Apple employees and 100,000 other iTunes users, but he says that he did not use the Developer Center exploit that he first submitted on July 16, instead garnering the data from the iAd Workbench issue.

TechCrunch reports that the data that Balic gained (limited to email addresses and Apple IDs) may have come from non-developer accounts, though Apple has clearly stated that only developer accounts were affected.

Throughout our conversation, Balic maintained that he was only ever trying to help Apple. When asked why he downloaded all that user data rather than simply reporting the bug, Balic says he just wanted to see how "deep" he could go. If he wanted to do ill, he says, he wouldn't have reported everything he found. For what it's worth, he also says he never attempted to reset anyone's password — the farthest he went was to email one of the addresses he had discovered and ask if it was really the person's Apple ID. Balic didn't get a response.

Due to the ambiguity of the source of the names and email addresses shown in Balic's video, it is unclear whether or not he caused the Dev Center outage by manipulating the iAd Workbench bug and it is equally unclear what his intentions were.

Popular Stories

maxresdefault

Apple Shows Off a Key Reason to Upgrade to the iPhone 17

Saturday February 7, 2026 9:26 am PST by
Apple today shared an ad that shows how the upgraded Center Stage front camera on the latest iPhones improves the process of taking a group selfie. "Watch how the new front facing camera on iPhone 17 Pro takes group selfies that automatically expand and rotate as more people come into frame," says Apple. While the ad is focused on the iPhone 17 Pro and iPhone 17 Pro Max, the regular iPhone...
apple wallet drivers license feature iPhone 15 pro

Apple Says These 7 U.S. States Plan to Offer iPhone Driver's Licenses

Monday February 9, 2026 6:24 am PST by
In select U.S. states, residents can add their driver's license or state ID to the Apple Wallet app on the iPhone and Apple Watch, and then use it to display proof of identity or age at select airports and businesses, and in select apps. The feature is currently available in 13 U.S. states and Puerto Rico, and it is expected to launch in at least seven more in the future. To set up the...
m5 macbook pro deal

Why You Shouldn't Buy the Next MacBook Pro

Tuesday February 10, 2026 4:27 pm PST by
Apple is planning to launch new MacBook Pro models as soon as early March, but if you can, this is one generation you should skip because there's something much better in the works. We're waiting on 14-inch and 16-inch MacBook Pro models with M5 Pro and M5 Max chips, with few changes other than the processor upgrade. There won't be any tweaks to the design or the display, but later this...
iOS 26

Apple Releases iOS 26.3 and iPadOS 26.3

Wednesday February 11, 2026 10:07 am PST by
Apple today released iOS 26.3 and iPadOS 26.3, the latest updates to the iOS 26 and iPadOS 26 operating systems that came out in September. The new software comes almost two months after Apple released iOS 26.2 and iPadOS 26.2. The new software can be downloaded on eligible iPhones and iPads over-the-air by going to Settings > General > Software Update. According to Apple's release notes, ...
Apple Logo Zoomed

Apple Expected to Launch These 10+ Products Over the Coming Months

Tuesday February 10, 2026 6:33 am PST by
It has been a slow start to 2026 for Apple product launches, with only a new AirTag and a special Apple Watch band released so far. We are still waiting for MacBook Pro models with M5 Pro and M5 Max chips, the iPhone 17e, a lower-cost MacBook with an iPhone chip, long-rumored updates to the Apple TV and HomePod mini, and much more. Apple is expected to release/update the following products...

Top Rated Comments

chrono1081 Avatar
164 months ago
The fact that he showed names and email addresses of his victims makes me not believe a single word about him not being malicious.

A smart and caring person would have blurred out names and addresses in their video.
Score: 18 Votes (Like | Disagree)
kdarling Avatar
164 months ago
"He just wanted to see how deep he could go" ...that's not a white-hat hacker.

Going as deep as possible is exactly what most developers reporting a bug do, in an attempt to be helpful.

And posting a YouTube video of your attack is not the way to deal with a serious security threat like this.

Eh? He didn't show how to do it.

This guy is at the least naive and immature, and at worst malicious. In either case, he's not a professional researcher, he's just a jackass looking for fame.

It sounds like he was scared that Apple might blame him for their goof.

He should have given Apple more time before resorting to doing this. At least a week to respond, it's a large company.

What on earth are you talking about? Resorting to what?

He officially and privately reported the data leaks to Apple, same as he had reported previous bugs. In (what he thought was a) response to his bug report, Apple shut down their website.

Days later, Apple finally posts a note blaming an intruder. He thought they meant him, although it's quite possible that his bug report actually clued them into a much larger problem.

And he still hasn't given any details on the data leak mechanics.

His only goof was showing some names in his video, but heck, even Apple claims those are not sensitive private details.
Score: 12 Votes (Like | Disagree)
chrono1081 Avatar
164 months ago
A smart and caring company would have made it unnecessary for him to go public.

I don't think you quite realize how security breaches work. He gave apple only a few hours, they probably didn't even get to his request in that time.

He went public immediately after. Real life is not like the movies, you need to find out how much data someone had access to before releasing a statement which takes time. Apple did it pretty quickly IMO.

Releasing something saying "WE GOT HACKED" without knowing anything about it is not only a PR disaster, but its not the right way to do things because people will want answers and you won't be able to give it to them without knowing what the hacker got ahold of.
Score: 12 Votes (Like | Disagree)
Rogifan Avatar
164 months ago
Seems to me this guy just wants attention and is clearly getting his wish.
Score: 8 Votes (Like | Disagree)
164 months ago
The fact that he showed names and email addresses of his victims makes me not believe a single word about him not being malicious.

A smart and caring person would have blurred out names and addresses in their video.

A smart and caring company would have made it unnecessary for him to go public.
Score: 7 Votes (Like | Disagree)
keysofanxiety Avatar
164 months ago
"If he wanted to do ill, he says, he wouldn't have reported everything he found."

Something about this just seems a little fishy, I dunno. If I was to break into your house but steal nothing, that would still be a crime. Especially knowing how seriously Apple take security, I think there's the potential for this to balloon out of control.
Score: 7 Votes (Like | Disagree)