Started By
Message

Apple denies iCloud breach for The Fappening

Posted on 9/2/14 at 1:43 pm
Posted by colorchangintiger
Dan Carlin
Member since Nov 2005
30979 posts
Posted on 9/2/14 at 1:43 pm
LINK

quote:

We wanted to provide an update to our investigation into the theft of photos of certain celebrities. When we learned of the theft, we were outraged and immediately mobilized Apple’s engineers to discover the source. Our customers’ privacy and security are of utmost importance to us. After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet. None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud® or Find my iPhone. We are continuing to work with law enforcement to help identify the criminals involved.

To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification. Both of these are addressed on our website at https://support.apple.com/kb/ht4232.


Looks like a little social engineering is to blame.
This post was edited on 9/2/14 at 1:45 pm
Posted by HailToTheChiz
Back in Auburn
Member since Aug 2010
48873 posts
Posted on 9/2/14 at 1:43 pm to
Riiiight
Posted by CAD703X
Liberty Island
Member since Jul 2008
77890 posts
Posted on 9/2/14 at 1:49 pm to
quote:

we advise all users to always use a strong password and enable two-step verification. Both of these are addressed on our website at


because like apple can't enforce stronger password creation rules??

scottrade, salesforce.com and my bank require not only much more rigid letter/number combinations than apple but they also require i change them on regular intervals as well.

eta icloud noods not as important as my last stock trade i guess.
This post was edited on 9/2/14 at 1:51 pm
Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 9/2/14 at 1:49 pm to
wtf is it then Apple

where is my LOL face...

here it is...

This post was edited on 9/2/14 at 1:50 pm
Posted by Spock's Eyebrow
Member since May 2012
12300 posts
Posted on 9/2/14 at 1:51 pm to
Here's hoping they're not playing games with the word "breach", because if those accounts were brute forced, that would be pretty Clintonesque of them.

Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 9/2/14 at 1:51 pm to
quote:

Looks like a little social engineering is to blame.



Social engineering of some sort was used to obtain the IDs but a flaw in find my iphone allowed for the brute force attempts to occur. apple should have locked the IDs after multiple failed tries but it did not.
Posted by TigerinATL
Member since Feb 2005
61423 posts
Posted on 9/2/14 at 1:53 pm to
quote:

Riiiight


It seems pretty plausible to me and honestly is what we should be talking about.

quote:

After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet.


How many SSN's + "Mother's Maiden Names" do you think the bad guys have after hacking Chase and multiple other banks? We need to completely overhaul our security infrastructure.
This post was edited on 9/2/14 at 1:54 pm
Posted by Spock's Eyebrow
Member since May 2012
12300 posts
Posted on 9/2/14 at 1:55 pm to
quote:

Social engineering of some sort was used to obtain the IDs but a flaw in find my iphone allowed for the brute force attempts to occur. apple should have locked the IDs after multiple failed tries but it did not.


It's still unclear whether the lockout bug had anything to do with it. If it did, I would consider it a "breach", and if Apple doesn't, they just had a "I did not have sexual relations with that woman" moment. (Which BTW Tim Cook could truthfully say.)
Posted by CAD703X
Liberty Island
Member since Jul 2008
77890 posts
Posted on 9/2/14 at 1:57 pm to
quote:

There are 26 lower-case letters, 26 upper-case letters, 10 digits and, depending on the web site, as many as a couple of dozen special characters (some sites won’t let you use certain characters). If you create a password with 6 digits, there are a million possibilities. If you use, however, six lower-case letters, the number jumps to over 300 million. And if you use a combination of upper- and lower-case letters, you get 2 billion different combinations. Add in special characters and the number of possibilities is in the hundreds of billions.



all of these things can easily be enforced at the point where people are creating their password for the first time.
Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 9/2/14 at 2:03 pm to
quote:

It seems pretty plausible to me and honestly is what we should be talking about.



then you are reading it wrong or know nothing about security
Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 9/2/14 at 2:04 pm to
quote:

It's still unclear whether the lockout bug had anything to do with it.


you cant brute force an account that does not suffer from a "lockout bug" unless you are a REALLY good guesser

quote:

a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet.


i mean they are basically describing the components of a brute force attack right here^^^

you social engineer your way into finding the correct answers to the security questions then you have the ID. once you have the ID you brute force the account effected by the "lockout bug"
This post was edited on 9/2/14 at 2:06 pm
Posted by TigerGman
Center of the Universe
Member since Sep 2006
11170 posts
Posted on 9/2/14 at 2:04 pm to
quote:

because like apple can't enforce stronger password creation rules??


Does Google?
Posted by TigerinATL
Member since Feb 2005
61423 posts
Posted on 9/2/14 at 2:10 pm to
quote:

then you are reading it wrong or know nothing about security



I'm just not assuming that these "leaks" are all tied to the recently patched flaw like you seem to be. If they are then it is on Apple, but we have nothing but timing to correlate the two, and the timing angle is suspect because what I've gleaned from the OT threads on the Fappening is that this is a collection of individual hacks being released at once, not one big breach.

Posted by TigerinATL
Member since Feb 2005
61423 posts
Posted on 9/2/14 at 2:11 pm to
quote:

because like apple can't enforce stronger password creation rules??


Why do you assume they don't. Here's a thread from 2011 of people bitching because Apple forced them to strengthen their passwords with iOS5.

quote:

On the new OS5 why is Apple requiring that you change your Apple ID to your e-mail account and requiring that all passwords now be 8 characters with at least one capital letter and two numbers?

LINK

Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 9/2/14 at 2:16 pm to
quote:

I'm just not assuming that these "leaks" are all tied to the recently patched flaw like you seem to be. If they are then it is on Apple, but we have nothing but timing to correlate the two, and the timing angle is suspect because what I've gleaned from the OT threads on the Fappening is that this is a collection of individual hacks being released at once, not one big breach.



oh its absolutely a collections of smaller breaches. it doesnt mean they didnt all use the same attack vector
Posted by colorchangintiger
Dan Carlin
Member since Nov 2005
30979 posts
Posted on 9/2/14 at 2:23 pm to
quote:

all of these things can easily be enforced at the point where people are creating their password for the first time.


of course they can, but even the bank that processes my student loan payments wouldn't let me have a password over 15 characters and wouldn't let me use symbols.
Posted by TigerinATL
Member since Feb 2005
61423 posts
Posted on 9/2/14 at 2:26 pm to
quote:

it doesnt mean they didnt all use the same attack vector


The most recently patched attack vector isn't the only one though. Looking for the password requirements I ran across this article from June on a Forensic tool that was capable of retrieving and cracking iCloud backups, without a password if you had access to their PC.

quote:

It’s not black magic, but works as a command-line tool extracting the iCloud binary authentication token. The “user must’ve been logged in to iCloud Control Panel on that PC at the time the computer is seized. If the user logged out of the Panel, the authentication tokens are then deleted.”

The newest version of Elcomsoft Phone Password Breaker can recover “the original plain-text passwords protecting encrypted backups for Apple and BlackBerry devices.” Those backups “contain address books, call logs, SMS archives, calendars and other organizer data, camera snapshots, voice mail and email account settings, applications, Web browsing history and cache.” Apple users, even if you don’t manually create backups, backups happen automatically every time you sync your device.

iCloud Control Panel is part of iTunes and comes installed on OS X devices, but has to be installed on Windows devices. “The given feature is confirmed to work even for accounts with Apple's two-step verification enabled, but does NOT work for Microsoft Live! accounts that use 2FA.”

LINK

I said in another thread that Apple has taken a bare minimum strategy with the cloud, so they certainly need to be taken to task over any problems caused by that, but I've seen people connect the wrong attack vector dots based solely on time correlation. After reading the article I posted I think I'll uninstall my iCloud control panel. I never really use it and if a security tool can weaponize it then a virus could too.
Posted by Spock's Eyebrow
Member since May 2012
12300 posts
Posted on 9/2/14 at 2:31 pm to
quote:

you cant brute force an account that does not suffer from a "lockout bug" unless you are a REALLY good guesser


True, and that gets down to what the meaning of "breach" is. Getting in due to the lockout vulnerability is a breach in my book, and I would hope Apple thinks the same way and isn't drawing such a fine technical distinction between "breach" and "targetted attack". I think it's going to come out if it's the lockout vulnerability, and they'll look like real weasels for not owning up in this statement. If the lockout vulnerability wasn't responsible, they should've explicitly said so, explain they log login attempts and saw no such activity, etc.

JLaw and the rest should reveal their passwords. Random ones probably could not have been brute-forced given Internet latency and the minimum requirements, which I read yesterday are 8 characters, upper and lower case, and digits.
Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 9/2/14 at 2:38 pm to
quote:

I would hope Apple thinks the same way and isn't drawing such a fine technical distinction between "breach" and "targetted attack".


sounds like that is precisely what they are doing

their biggest fanboys just got pwned in the worst kind of way. they arent gonna come right out and go "my bad yall". i also find it hard to believe that apple ran through the entire IR process and has all the answers 40 hours later

This post was edited on 9/2/14 at 2:42 pm
Posted by gmrkr5
NC
Member since Jul 2009
14881 posts
Posted on 9/2/14 at 2:40 pm to
quote:

The most recently patched attack vector isn't the only one though. Looking for the password requirements I ran across this article from June on a Forensic tool that was capable of retrieving and cracking iCloud backups, without a password if you had access to their PC.



and gaining access to all these individuals personal computers would be exponentially harder than brute forcing an online service

plus, how many of them do you think actually sync there apple devices to their personal computers?
first pageprev pagePage 1 of 2Next pagelast page

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on Twitter, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookTwitterInstagram