Close ad

After several days of Apple's internal investigation, the company issued a statement regarding hacking iCloud accounts of some celebrities, whose delicate photos leaked to the public. According to Apple, the photos were not leaked by hacking iCloud and Find My iPhone services, as the way the hackers obtained the photos, the California company's engineers determined a targeted attack on usernames, passwords and security questions. However, they did not comment on how the iCloud photos were obtained.

According to Wired, the passwords were cracked using forensic software used by government agencies. On the Bulletin Board Anon-IB, where several celebrity photos appeared, some members openly discussed using the software on behalf of ElcomSoft Phone Password Breaker. This allows you to enter the obtained usernames and passwords to retrieve the entire backup files from the iPhone and iPad. According to a security expert interviewed by Wired, the metadata from the photos matches the use of the said software.

The hackers only had to obtain usernames (Apple ID) and passwords, which they achieved probably thanks to the previously mentioned method using the program iBrute along with the Find My iPhone vulnerability, which allowed attackers to guess the password without a limit on the number of attempts. Apple patched the vulnerability soon after it was discovered. The fact that the victims of the hacker attack did not use two-step verification, which requires entering a code sent to the phone, also played a big role. It should be noted that two-step verification does not apply to iCloud backup and Photo Stream services, however, they would make it much more difficult to obtain username passwords in the first place.

However, even with two-step verification, iCloud is not ideally protected. As discovered by Michael Rose of the server TUAW, when synchronizing Photo Stream, Safari backup, and email messages to a new Apple computer, there is no warning to the user that data has been accessed from the new computer. Only with the knowledge of the Apple ID and password was it possible to download the mentioned content without the user's knowledge. As you can see, Apple's cloud services still have some cracks, even if the user is protected by two-step verification, which, by the way, is still not available in, for example, the Czech Republic or Slovakia. After all, after this affair, Apple's shares fell by four percent.

Source: Wired
.