• Hey Guest. Check out your NeoGAF Wrapped 2025 results here!

"No iCloud breach" according to Apple. Targeted attack.

Status
Not open for further replies.
This is why the "security question" system is really stupid. EA forced me to set a bunch of security questions before letting me change my password on Origin. I THINK I chose good enough questions, but some of the questions could easily be brute forced (what is your car model?).

choose answers that don't make sense.
 
Way too slow to do thousands of queries (dictionary attack) against security questions with double digit ms latency???

Huh?

Dictionary attacks are not the same as brute forcing, the latter which is far too slow seeing as they in best case scenario only get about 25 guesses per second.
 
The thing is... is it better or worse for Apple PR that there was no "breach" of the iCloud system?

Regardless of the method the hackers used to obtain the information, the fact remains: dozens of celebrities had their private photos stolen from their accounts. They had no idea it had happened.

So what does it say about the security of iCloud for the average user when it's revealed that this WASN'T the result of a security hole in their system (which was then patched and corrected, meaning it would be harder for hackers today to get that same information), but rather the result of their security operating exactly as it was meant to? As in, not very well for these celebrities? Basically, nothing's preventing someone from continuing to gain access to people's private accounts, using the exact same techniques.

I mean, I guess Apple gets to shift the "blame" (or responsibility) to the individual users for not having secure-enough passwords or security questions (under the system Apple set up), but I don't think this statement gets them out of hot water, because the takeaway seems to be that everyone's data - not just celebrities' - is vulnerable to targeted attacks / social engineering methods under their current security setup (unless they start requiring 2-step verification, etc.), and that's just not the way you want to reassure people about their data. "You'll be fine as long as hackers don't make educated guesses about your security questions and password, like they did for these celebrities. You won't know if they do, though.'

EDIT: Valleywag / Gawker made a similar / related point, in less diplomatic fashion

iCloud Isn't Safe, Because Everyone's a Target and Apple Doesn't Care

This statement, which probably had several thousand pairs of lawyer eyeballs on it before it was sent to the press, is slippery. It hinges on very particular readings of words like "breach." Apple insists its iCloud service—which it touts as a seamless way of backing up your entire digital existence—was not "breached." This is maybe true in the sense that the celebrity nude traders didn't break or manipulate Apple code, but false and horribly misleading in the sense that they easily gamed Apple's system. And as Mat Honan will tell you, it's been that easy to get around for well over two years.

To fix this, Apple could have simply forced everyone to use two-factor verification for their accounts. It's easy, and would have probably prevented all of this. But Apple didn't do that (though you should still do it for yourself).

So, in the meantime, want to know how to get into someone's iCloud? It's this easy. Tell Apple you forgot that person's password, and then guess their security questions with readily available biographical information other Silicon Valley corporations have goaded us all into sharing.

Like basically, "Nope, no one broke into our system! Our default security is just shitty! Carry on!"
 
Here is something I read on the internet that I believe (sue me).

I went to /b/, something I rarely rarely do just to see if I could find anything else about this. I saw a post (that is surely gone now) about a secretive ring of celebrity nude traders. The only way you could get in is if you offered original nudes that no one else had, including the nude traders.

Apparently this ring operated for years, a certain small set of individuals individually targeting celebrity accounts through social exploits over time (password resets, etc). This ring hardly ever expanded as very few people could socially engineer and compromise an account.

However, apparently one guy in the ring made an announcement that he was going to post his stash of traded nudes. Not to be outdone, another guy did it first on 4chan (the original leaker). This means that these photos could be months or even years old if they were just collected over time through the nude trading ring.

This would also explain the existence of the nude photos that had ostensibly been deleted some time ago. One of the traders may have compromised the account some time ago, and held on to the photos (after they were deleted) and posted them once they all started coming out.

Personally I find this much more believable than a 1-day, massive strike.
 
Here is something I read on the internet that I believe (sue me).

I went to /b/, something I rarely rarely do just to see if I could find anything else about this. I saw a post (that is surely gone now) about a secretive ring of celebrity nude traders. The only way you could get in is if you offered original nudes that no one else had, including the nude traders.

Apparently this ring operated for years, a certain small set of individuals individually targeting celebrity accounts through social exploits over time (password resets, etc). This ring hardly ever expanded as very few people could socially engineer and compromise an account.

However, apparently one guy in the ring made an announcement that he was going to post his stash of traded nudes. Not to be outdone, another guy did it first on 4chan (the original leaker). This means that these photos could be months or even years old if they were just collected over time through the nude trading ring.

This would also explain the existence of the nude photos that had ostensibly been deleted some time ago. One of the traders may have compromised the account some time ago, and held on to the photos (after they were deleted) and posted them once they all started coming out.

Personally I find this much more believable than a 1-day, massive strike.

This makes a lot of sense and explains how this leak contains pictures of so many celebrities.
 
Here is something I read on the internet that I believe (sue me).

I went to /b/, something I rarely rarely do just to see if I could find anything else about this. I saw a post (that is surely gone now) about a secretive ring of celebrity nude traders. The only way you could get in is if you offered original nudes that no one else had, including the nude traders.

Apparently this ring operated for years, a certain small set of individuals individually targeting celebrity accounts through social exploits over time (password resets, etc). This ring hardly ever expanded as very few people could socially engineer and compromise an account.

However, apparently one guy in the ring made an announcement that he was going to post his stash of traded nudes. Not to be outdone, another guy did it first on 4chan (the original leaker). This means that these photos could be months or even years old if they were just collected over time through the nude trading ring.

This would also explain the existence of the nude photos that had ostensibly been deleted some time ago. One of the traders may have compromised the account some time ago, and held on to the photos (after they were deleted) and posted them once they all started coming out.

Personally I find this much more believable than a 1-day, massive strike.

Yep. if this isn't the case then I will be shocked.
 
Dictionary attacks are not the same as brute forcing, the latter which is far too slow seeing as they in best case scenario only get about 25 guesses per second.
A dictionary attack is literally step 1 of a brute force attack. 25 guesses per second is 90,000 an hour. Per computer. That's plenty, considering most security question answers are dictionary/common words/phrases.

You're probably thinking of an offline brute force attack, where CPUs/GPUs crank away at a database with millions of guesses per second. But just because it's online and going much slower doesn't mean it's not brute force.

This was definitely a "targeted attack", though (in that the hackers picked a small number of accounts to go after), which is why it worked.

Here is something I read on the internet that I believe (sue me).

I went to /b/, something I rarely rarely do just to see if I could find anything else about this. I saw a post (that is surely gone now) about a secretive ring of celebrity nude traders. The only way you could get in is if you offered original nudes that no one else had, including the nude traders.

Apparently this ring operated for years, a certain small set of individuals individually targeting celebrity accounts through social exploits over time (password resets, etc). This ring hardly ever expanded as very few people could socially engineer and compromise an account.

However, apparently one guy in the ring made an announcement that he was going to post his stash of traded nudes. Not to be outdone, another guy did it first on 4chan (the original leaker). This means that these photos could be months or even years old if they were just collected over time through the nude trading ring.

This would also explain the existence of the nude photos that had ostensibly been deleted some time ago. One of the traders may have compromised the account some time ago, and held on to the photos (after they were deleted) and posted them once they all started coming out.

Personally I find this much more believable than a 1-day, massive strike.
Yeah, if it had been a 1-day effort, it would be 25% of iCloud users, not just a few celebrities. And apple wouldn't be able to say it wasn't their fault.
 
This whole thing made me realize that every account I have has two-step authentication except for Amazon. They should get on that.
 
Of course, this had to blow up now. Not a month ago, not two months from now. Now. If someone wanted to start a shit storm before the announcement, they pretty much succeeded.
 
The thing is... is it better or worse for Apple PR that there was no "breach" of the iCloud system?

Regardless of the method the hackers used to obtain the information, the fact remains: dozens of celebrities had their private photos stolen from their accounts. They had no idea it had happened.

So what does it say about the security of iCloud for the average user when it's revealed that this WASN'T the result of a security hole in their system (which was then patched and corrected, meaning it would be harder for hackers today to get that same information), but rather the result of their security operating exactly as it was meant to? As in, not very well for these celebrities? Basically, nothing's preventing someone from continuing to gain access to people's private accounts, using the exact same techniques.

I mean, I guess Apple gets to shift the "blame" (or responsibility) to the individual users for not having secure-enough passwords or security questions (under the system Apple set up), but I don't think this statement gets them out of hot water, because the takeaway seems to be that everyone's data - not just celebrities' - is vulnerable to targeted attacks / social engineering methods under their current security setup (unless they start requiring 2-step verification, etc.), and that's just not the way you want to reassure people about their data. "You'll be fine as long as hackers don't make educated guesses about your security questions and password, like they did for these celebrities. You won't know if they do, though.'

Well celebrities are high-profile targets and so much of their information is public knowledge due to the massive amount of interviews they do (plus all the daily tweeting and instagramming of their personal life). This innocent tweet from actress Julie Benz probably revealed the answer to one of her security questions (pets name) for example. Most security questions/answers for celebs could be found in a two second Google search - we know when and where they were born, their mothers name, pets name, basically everything.

The only way to make these typical security question/answers secure is by putting in random gibberish and storing that in a password manager. When a website asks me what is my mothers maiden name or whatever, I put in something like "eFsDGxW4TcjK=Mfj.u8cRT" which is randomly generated, impossible to guess, extremely difficult to brute force. Not everyone uses password managers though and they end up picking something easy to remember which is also usually easy for others to guess/research.

I do think Apple (and every other company) should send out an email with some basic security tips. Raise awareness of things like two-factor authentication and maybe even provide some incentives for people to secure their account with 2FA, like a free iTunes song credit or an extra gig of iCloud storage or something.
 
The thing is... is it better or worse for Apple PR that there was no "breach" of the iCloud system?

EDIT: Valleywag / Gawker made a similar / related point, in less diplomatic fashion

iCloud Isn't Safe, Because Everyone's a Target and Apple Doesn't Care



Like basically, "Nope, no one broke into our system! Our default security is just shitty! Carry on!"

Social engineering/searching social media for info works for a lot of different services. If the law enforcement stuff was used two step wouldn't matter anyway if someone has the username and password, which is far from exclusive to Apple. IIRC the procedures at Apple and Amazon that allowed the Honan stuff were changed.

And Gawker complaining about social engineering/social media/privacy sends the hypocrisy scale off the charts.
 
Is there a reason to believe this isn't a lie? Like, I don't think it would be illegal for Apple to put out a statement they know is false for a service that is free. No one would get fined or go to jail. Hell the CIA makes a hobby out of lying to congress on a regular basis. Why is this to be believed?
 
Well celebrities are high-profile targets and so much of their information is public knowledge due to the massive amount of interviews they do (plus all the daily tweeting and instagramming of their personal life). This innocent tweet from actress Julie Benz probably revealed the answer to one of her security questions (pets name) for example. Most security questions/answers for celebs could be found in a two second Google search - we know when and where they were born, their mothers name, pets name, basically everything.

The only way to make these typical security question/answers secure is by putting in random gibberish and storing that in a password manager. When a website asks me what is my mothers maiden name or whatever, I put in something like "eFsDGxW4TcjK=Mfj.u8cRT" which is randomly generated, impossible to guess, extremely difficult to brute force. Not everyone uses password managers though and they end up picking something easy to remember which is also usually easy for others to guess/research.

I do think Apple (and every other company) should send out an email with some basic security tips. Raise awareness of things like two-factor authentication and maybe even provide some incentives for people to secure their account with 2FA, like a free iTunes song credit or an extra gig of iCloud storage or something.

Yeah, but don't a lot of people in our lives - co-workers, classmates, Facebook acquaintances, etc. - have access to the basic answers to our security questions as well? People who want to break into our accounts aren't always going to be anonymous hackers half-way across the country.

And, you know, if companies are going to continue to use the security question method for password recovery, maybe they need to start coming up with better security questions that don't have easily guessable or publicly available information as responses. It doesn't seem like a whole lot of thought is put into them for most websites. "What's a question we can use? Ooh, first pet's name. Or, first car they owned. No one's EVER going to reveal that during something like Throwback Thursday on Facebook."

Not faulting Apple specifically here, but saying "our security's as good as any other online service - as in, not that great" doesn't inspire confidence going forward, and if anything this incident shows there needs to be improvement in user education, and maybe some tweaking to the existing regime.
 
Yeah, but don't a lot of people in our lives - co-workers, classmates, Facebook acquaintances, etc. - have access to the basic answers to our security questions as well? People who want to break into our accounts aren't always going to be anonymous hackers half-way across the country.

And, you know, if companies are going to continue to use the security question method for password recovery, maybe they need to start coming up with better security questions that don't have easily guessable or publicly available information as responses. It doesn't seem like a whole lot of thought is put into them for most websites. "What's a question we can use? Ooh, first pet's name. Or, first car they owned. No one's EVER going to reveal that during something like Throwback Thursday on Facebook."

Not faulting Apple specifically here, but saying "our security's as good as any other online service - as in, not that great" doesn't inspire confidence going forward, and if anything this incident shows there needs to be improvement in user education, and maybe some tweaking to the existing regime.

Yeah I feel like there should be a better system in place. Two or three very basic security question/answers just isn't cutting it and allows for accounts to easily be taken over through social engineering.

The one positive thing from all of these hacks is that it will hopefully get people to take their security more seriously. I was kinda lax when it came to passwords and stuff until Mat Honan from Wired was hacked and detailed what happened/provided tips to prevent it. Lots of major sites are publishing security tips so that's good.
 
Tough crowd. Is anyone watching Jon Stewart, is he making jokes?

All in good fun; I'd say the majority of the most famous modern comedy is stuff most people saw on cable. I'm just telling a joke, ironically bad in more way than one lol. Just in the general spirit of giving Conan a little shit for touching the subject; albeit it's his job lol.
 
Just a heads-up: while two-step still isn't implemented across all of Apple's services for whatever reason, instating it DOES mean you can't reset a password via email or security question authentication anymore. Resetting a password when 2-step is enabled requires a trusted device and the account recovery key.
 
This is why the "security question" system is really stupid. EA forced me to set a bunch of security questions before letting me change my password on Origin. I THINK I chose good enough questions, but some of the questions could easily be brute forced (what is your car model?).

Pick fake answers. Use real answers but mix them up, so your first car is the name of your first school or whatever. Use deliberate misspellings. Use a password manager that lets you generate gibberish answers (First car? GU7!9jh4$). There are plenty of ways to protect security questions from guesses.
 
Well this at least finally convinced me to finally enable 2 factor on a few accounts, even if this would not have stopped this hack in particular.

Of course it seems like a nightmare if I lose my phone /my phone dies.
 
Pick fake answers. Use real answers but mix them up, so your first car is the name of your first school or whatever. Use deliberate misspellings. Use a password manager that lets you generate gibberish answers (First car? GU7!9jh4$). There are plenty of ways to protect security questions from guesses.

this is friggin brilliant. wow. Thanks for this!
 
http://www.apple.com/pr/library/2014/09/02Apple-Media-Advisory.html

So Apple acknowledged the nude leaks over the past few days saying that the accounts "were compromised by a very targeted attack on user names, passwords and security questions".

Sucks that this happened but if the 4chan stuff is true the guy behind this (or at least who had uploaded a huge chunk) has been identified.

Still wonder about that one star who insisted the pics were deleted. Of course the more likely answer there is that "deleted" wasn't what they actually did in that case.

She doesn't know that if you delete the pics from your local album they STILL reside in your photostream.....
 
There's a story on The Daily Mail (banned site, no link) Access Hollywood about Eva Longoria getting phones calls from Apple employees who accessed her private information.

I can't imagine it was too difficult to hack accounts with such upstanding citizens protecting your data.
 
There's a story on The Daily Mail (banned site, no link) about Eva Longoria getting phones calls from Apple employees who accessed her private information.

I can't imagine it was too difficult to hack accounts with such upstanding citizens protecting your data.

Can't imagine why you'd take the daily mail seriously a breath after acknowledging its status as a banned site.
 
So besides Amazon, I'm noticing that eBay doesn't have two-step. And even though Paypal has two-step, it can be breached through eBay. Is that old news that's been fixed?
 
Pick fake answers. Use real answers but mix them up, so your first car is the name of your first school or whatever. Use deliberate misspellings. Use a password manager that lets you generate gibberish answers (First car? GU7!9jh4$). There are plenty of ways to protect security questions from guesses.

Well if that's what you have to do, then it's really no longer a security question so the point I think stands that the security question system is really stupid. At that point you're just having a secondary random password. You may as well just say enter a second password rather than what school did you go to or what is your first car.
 
what's your problem? I've provided a link to the interview. Are you saying it's all fake?

there is a reason the daily mail is banned on GAF

they are pretty much the worst paper, and worst source of anything anywhere

edit: hm...someone else is the source. thats ok then
 
what's your problem? I've provided a link to the interview. Are you saying it's all fake?

The first problem is citing a known bad site and speculating. The second problem is she doesn't appear to know what she's talking about, or how she was contacted, much less it being unlikely there's an employee who would identify themselves outright. But it is a hot time to post the words "Apple" and "privacy" together.
 
There's a story on The Daily Mail (banned site, no link) Access Hollywood about Eva Longoria getting phones calls from Apple employees who accessed her private information.

I can't imagine it was too difficult to hack accounts with such upstanding citizens protecting your data.

Or... Maybe that's reverse engineering at work...
 
Not quite -- they've said there was no "breach," which is like saying nobody "broke into iCloud." This is true, but isn't necessarily pertinent to the issue at hand.

But how would the hacker know what their icloud account ID is inorder to brute force?

Plus a bunch of the leaked pics weren't from icloud.

Something else went down.
 
Apple stock is down 4% today, and it seems like Tim Cook is sweating a bit.

http://www.businessinsider.com/tim-cook-apple-and-the-icloud-hack-2014-9
http://techcrunch.com/2014/09/02/why-apple-should-be-more-transparent-about-security/

Hell, even Apple is warning some developers against storing stuff in iCloud.
http://www.businessinsider.com/apple-says-healthkit-developers-must-not-store-data-in-icloud-2014-9

I'm shocked that the lawsuits over this haven't happened yet.

"Apps using the HealthKit framework that store usersÂ’ health information in iCloud will be rejected."

Say whaat? So they don't want to be responsible for their own user's data?
 
But how would the hacker know what their icloud account ID is inorder to brute force?

Plus a bunch of the leaked pics weren't from icloud.

Something else went down.

All it takes is one. You get one person's info, get into iCloud and now you have access to their contacts. Their contacts have e-mails which you use to find more iCloud accounts, and repeat.
 
Well if that's what you have to do, then it's really no longer a security question so the point I think stands that the security question system is really stupid. At that point you're just having a secondary random password. You may as well just say enter a second password rather than what school did you go to or what is your first car.

Yeah, security questions are terrible and should never be used. But they're even recommended by owasp.

One thing people talk about is brute-force protection. That's a rather difficult problem though, since locking accounts also opens up easy ddos options and most brute-force protection can easily be circumvented. Just use a few passwords to attack tons of different accounts and use proxies to switch the ip from which the logins come.
 
Status
Not open for further replies.
Top Bottom