• Hey Guest. Check out your NeoGAF Wrapped 2025 results here!

"No iCloud breach" according to Apple. Targeted attack.

Status
Not open for further replies.
That's a lot of individual accounts compromised though which would almost make me less confident in apples security than one overall gap in iCloud

Tbh, I would guess it is more like a celeb choosing something stupid like "mothers maiden name" as their security question.
This isn't exactly the first time this has happened. GQ did a story on a guy who did this on a similarly large scale a few years ago. Great article:

http://www.gq.com/news-politics/newsmakers/201205/chris-chaney-hacker-nude-photos-scarlett-johansson

Basically a lot of people (celebrities included) have stupidly obvious passwords.
 
On one of the now closed threads, a 4chan screencap was posted saying it was part of a celebrity picture trading 'club' that has been going on for years. One of the members decided to post a bunch of the pics. It explains the 'deleted' picture since it wasn't deleted when it was hacked.
 
I've always wondered with compromised Apple IDs, don't you need to map the stolen credentials to an Apple device to be able to retrieve stuff from iCloud? Is there a Windows plugin that allows you to pull this data from something other than a Mac or iOS device?

There's no way to view images from icloud.com that I've seen.
 
I wonder if Tim Cook will address it next week?

They'll be talking about iOS 8, and one of its features is that it syncs all your photos. So no, they're not going to talk about a potential photo leak.

I've always wondered with compromised Apple IDs, don't you need to map the stolen credentials to an Apple device to be able to retrieve stuff from iCloud? Is there a Windows plugin that allows you to pull this data from something other than a Mac or iOS device?

There's no way to view images from icloud.com that I've seen.

iCloud Control Panel syncs all your iCloud photos into your Windows pictures folder.
 
I'm always skeptical with stories like this.

After google search listing the names of those hacked....no longer skeptical. 8-O

I'm thinking this person will probably be caught...maybe.
 
Didn't one of the celebs say some of the pictures were really old and deleted?

That would mean the people who did this had access to those accounts for a while. It didn't happen over the weekend when ibrute was made public.

I don't know how they can say it isn't their problem when all the content came from iCloud. Someone somewhere managed to get repeated access to an account without that person knowing.
 
So the people who broke into the accounts just ran a script that guess a shitload of passwords til it got it right? I'm stunned there was no protection against that, seems like it should be mandatory for any site.

edit:It wasn't that it seems, should of read the statement first instead of other posts.
 
Didn't one of the celebs say some of the pictures were really old and deleted?

That would mean the people who did this had access to those accounts for a while. It didn't happen over the weekend when ibrute was made public.

I don't know how they can say it isn't their problem when all the content came from iCloud. Someone somewhere managed to get repeated access to an account without that person knowing.

My guess would be iCloud amongst other services have been breeched repeatedly over time and this wasn't just a one off.
 
"Hey guys, sorry about that iCloud photo leak, anyway, let's talk about the new iPhone that stores your credit card details and information about your home and health"
Nah, if anything, mention something to instill confidence in the iCloud brand.
 
This was a ring that operated for sharing celeb nude pictures.

It was private, dark web stuff. You got to be a part of it if you brought in new material.

So, this was pictures hacked over many years by different users. It was all being exchanged without public knowledge until one person decided to buy more and make some pictures public.
Do we really know that for sure though? For that matter, what do we really know about this? I feel like most of the reporting on this has just been an echo chamber... one source says a random hacker they asked said it might be a Find My iPhone flaw, and then everyone starts quoting it as though it's the gospel truth.

I would think someone who had the leaked files should be able to look at the metadata on the photos to come up with a more complete picture of what happened. If they're >85% iPhone/iPad photos, I'd be skeptical of a dark web ring. That sort of shared network would have photos from all sorts of sources. Does iCloud put any sort of marker on files to mark them as have come from iCloud? Are there any patterns to the timestamps, EXIF data, image resolution, post-processing, etc... that narrow the possibilities? It doesn't help that this subject is morally questionable enough that I would expect most legitimate news outlets would not publicly handle the actual leaked images to do such reporting.
 
That makes no sense.

it happened due to their shitty security at the first place.

http://www.engadget.com/2014/09/01/find-my-iphone-exploit/?ncid=rss_truncated

So I don't know what their press release means.

It means "we're covering our asses as best as we can, please don't sue us!"

If there's any justice, then JLaw and Kate would team up, along with every other celebrity targeted in this attack, and sue Apple. And just to twist the knife a little bit, sign a Windows Phone endorsement deal with Microsoft.

I'm going to tweet that to Kate and see if she notices.
 
There would be no other reason to mention find my iphone if not for that brute force exploit published a few days ago.

There's plenty of reason to mention Find my iPhone and iCloud. They are counteracting the popular narrative ("Somebody hacked iCloud and Find My iPhone"), while stopping well short of denying what likely occured ("Somebody guessed a bunch of iCloud passwords").

It means "we're covering our asses as best as we can, please don't sue us!"
This is exactly my read on it. They're trying to counteract the idea that there is (or rather was) a flaw in iCloud or Find My iPhone: this was a "targeted attack", there is no "breach", this is "all too common" occurrence on the internet. All these things are true, but none of them eliminate the possibility that iCloud was vulnerable to a brute force attack.
 
yeesh, and now apparently some of the woman may have been underage.

If the leaker(s) ever get(s) caught, he's(they're) in for some time.

EDIT: Also, Apple really had nothing to do with anything did they? I don't really get how this was a security breach, seems it was pure social engineering.
 
There's plenty of reason to mention Find my iPhone and iCloud. They are counteracting the popular narrative ("Somebody hacked iCloud and Find My iPhone"), while stopping well short of denying what likely occured ("Somebody guessed a bunch of iCloud passwords").
No, the main narrative for find my iPhone is the brute force exploit. I don't see a reason to mention it unless to specifically call out the speculation of it being the vector for the intrusion.
 
McKayla Maroney was underage in her leaked pics

http://www.foxnews.com/entertainmen...cked-mckayla-maroney-pics-banned-from-reddit/

It means "we're covering our asses as best as we can, please don't sue us!"

If there's any justice, then JLaw and Kate would team up, along with every other celebrity targeted in this attack, and sue Apple. And just to twist the knife a little bit, sign a Windows Phone endorsement deal with Microsoft.

I'm going to tweet that to Kate and see if she notices.

LOL
 
I wouldn't be surprised if Cook takes a jab at this during the presentation, not by addressing the subject directly but by praising and reinforcing iCloud and Apple's security and privacy policies at some appropriate point during the keynote, probably when going through iCloud's new features.
 
I wouldn't be surprised if Cook takes a jab at this during the presentation, not by addressing the subject directly but by praising and reinforcing iCloud and Apple's security and privacy policies at some appropriate point during the keynote, probably when going through iCloud's new features.

Someone I talked to on twitter yesterday said he wouldn't be surprised if iCloud gets as many mentions in the upcoming conference as Kinect got at Microsoft's E3 presentation this year- one token reference, nothing more, if that.
 
I wouldn't be surprised if Cook takes a jab at this during the presentation, not by addressing the subject directly but by praising and reinforcing iCloud and Apple's security and privacy policies at some appropriate point during the keynote, probably when going through iCloud's new features.
Exactly.

The general public doesn't understand "brute force" intrusion. All of the headlines we saw were "iCloud hacked". That's enough to evoke fear in the minds of consumer.

Also, the upcoming Apple products (iPhone and iWatch) will both include features that will potentially store data in iCloud (Wallet and Healthkit). If the public is afraid of of the recent headlines that could spell disaster for their brand.

I think it will be addressed.
 
Someone I talked to on twitter yesterday said he wouldn't be surprised if iCloud gets as many mentions in the upcoming conference as Kinect got at Microsoft's E3 presentation this year- one token reference, nothing more, if that.
Well, I find that hard to happen because there's all sorts of new iCloud stuff launching with the new iPhone. iCloud drive, iCloud photo library, new storage tiers, etc. But you never know.
 
Well, I find that hard to happen because there's all sorts of new iCloud stuff launching with the new iPhone. iCloud drive, iCloud photo library, new storage tiers, etc. But you never know.

Do they want to look oblivious to the PR disaster at hand here? I doubt it.
 
“All that’s needed to access online backups stored in the cloud service are the original user’s credentials including Apple ID…accompanied with the corresponding password,” the company’s website reads. “Data can be accessed without the consent of knowledge of the device owner, making Elcomsoft Phone Password Breaker an ideal solution for law enforcement and intelligence organizations.”

http://www.wired.com/2014/09/eppb-icloud/

For Apple, the use of government forensic tools by criminal hackers raises questions about how cooperative it may be with Elcomsoft. The Russian company’s tool, as Zdziarski describes it, doesn’t depend on any “backdoor” agreement with Apple and instead required Elcomsoft to fully reverse engineer Apple’s protocol for communicating between iCloud and its iOS devices. But Zdziarski argues that Apple could still have done more to make that reverse engineering more difficult or impossible.

“When you have third parties masquerading as hardware. it really opens up a vulnerability in terms of allowing all of these different companies to continue to interface with your system,” he says. “Apple could take steps to close that off, and I think they should.”

So "law enforcement" software might have been used to "fake" iCloud into thinking that a valid iOS device was requesting a backup.
 
That's pretty lame. In what way is "accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet" not a case of a "breach in any of AppleÂ’s systems"? "Compromised" and "breached" are synonyms, dogs.

"Our systems are secure unless someone attacks them using a common method that we know about but don't secure against" doesn't exactly inspire confidence.
 
An interesting read

https://www.nikcub.com/posts/notes-on-the-celebrity-data-theft/

5. In reviewing months worth of forum posts, image board posts, private emails, replies for requests for services, etc. nowhere was the FindMyPhone API brute force technique (revealed publicly and exploited in iBrute) mentioned. This doesn’t mean that it wasn’t used privately by the hackers – but judging by the skill levels involved, the mentions and tutorials around other techniques and some of the bragged about success rates with social engineering, recovery, resets, rats and phishing – it appears that such techniques were not necessary or never discovered.

6. iCloud is the most popular target because Picture Roll backups are enabled by default and iPhone is a popular platform. Windows Phone backups are available on all devices but are disabled by default (it is frequently enabled, although I couldnÂ’t find a statistic) while Android backup is provided by third party applications (some of which are targets).

7. Apple accounts seem particularly vulnerable because of the recovery process, password requirements and ability to detect if an email address has an associated iCloud account. The recovery process is broken up into steps and will fail at each point. While Apple do not reveal if an email address is a valid iCloud address as part of the recover process, they do reveal if it is valid or not if you attempt to sign up a new account using the same email – so verification (or brute force attempts) are simple. The second step is verifying the date of birth and it will pass or fail based on that data alone so can be guessed, while the last step are the two security questions. It would be a good idea for Apple to kill the interface on signup that shows new users if their email account is available to use as an iCloud account or not. It would also be a good idea to make the recovery process one big step where all data is validated at once and the user is not given a specific error message. It would also be wise to attach rate limits and strict lockout on this process on a per-account basis.

Being able to POST an email address to https://appleid.apple.com/account/validation/appleid and getting back a response indicating if it is a valid account or not, with little to no rate limiting, is a bug.

7. a) To reiterate what the main bugs are that are being exploited here, roughly in order of popularity / effectiveness:

Password reset (secret questions / answers)
Phishing email
Password recovery (email account hacked)
Social engineering / RAT install / authentication keys

7. b) Once they have access to the account they have access to everything – they can locate the phone, retrieve SMS and MMS messages, recover deleted files and photos, remote wipe the device and more. The hackers here happen to focus on private pictures, but they had complete control of these accounts for a period.

8. Authentication tokens can be stolen by a trojan (or social engineered) from a computer with iTunes installed easily. Elcomsoft provide a tool called atex which does this. On OS X the token is installed in the keychain. The authentication token is as good as a password.

9. Two-factor authentication for iCloud is useless in preventing passwords or authentication tokens being used to extract online backups. 2fa is used to protect account details and updates.
 
That makes no sense.

it happened due to their shitty security at the first place.

http://www.engadget.com/2014/09/01/find-my-iphone-exploit/?ncid=rss_truncated

So I don't know what their press release means..
Umm.. You didn't read the article not actually look into iCloud protection I take it.

iCloud on any login has failed attempt lockout after three(?) failed attempts.

What didn't have brute force enforced on it were the security questions.

Even still brute force isn't an exploit in and of itself. It's basically a safety net to reinforce actual security. Could it have mitigated some of this? Probably. Would it have prevented all of it? Certainly not. Was it responsible for most of this? Who knows.

The article you linked to was a theory with no proof. And with the age of some pics it's more likely than not this was a targeted effort over a very long period of time. About this biggest take away there is from apple on this IMHO is needing to enhance their security so it is even more difficult to get by through social engineering.
 
Do they want to look oblivious to the PR disaster at hand here? I doubt it.
Not oblivious.

After showing off some new features, expect a whole slide going like:

"Of course at Apple, we take security and privacy very seriously

That's why iCloud features

128-bit AES encryption
2-step verification
bla-bla-bla
Bullshit I haven't even heard of
Industry gold standard
Okay now I'm just making stuff up
etc"
 
Is there a good reason that companies like Apple or Google shouldn't one day implement mandatory Two-Step Verification, providing you have the gadget (ie, Smartphone) to utilize it?
 
Is there a good reason that companies like Apple or Google shouldn't one day implement mandatory Two-Step Verification, providing you have the gadget (ie, Smartphone) to utilize it?
Two-step over verification wouldn't have worked in this case. But you're right, it should be mandatory.
 
No iCloud breach, for some definition of "breach".

They screwed up -- but then again, security is hard, and you don't need to screw up bad to get bad results.

Nevermind that their system is designed to be easy (which is what consumers want), and easy means more vulnerable.

Two-step over verification wouldn't have worked in this case. But you're right, it should be mandatory.
2 step verification is such a pain in the ass that it's not clear if people will ever put up with it being mandatory.

Doubt it, way too slow to do efficient brute forcing on those accounts. You gotta realize that with doing this over the network its going to take ages with all the delays.
Way too slow to do thousands of queries (dictionary attack) against security questions with double digit ms latency???

Huh?
 
Status
Not open for further replies.
Top Bottom