Developer reported iCloud brute-force password hack to Apple nearly six month ago

Shawn Knight

Posts: 15,311   +193
Staff member

developer icloud apple celebgate apple icloud vulnerability hacker brute force hack

The iCloud security incident that made headlines early this month could possibly have been prevented. That’s because London-based software developer Ibrahim Balic claims to have reported a brute-force iCloud password attack to the Cupertino-based company nearly six months ago.

The Daily Dot obtained e-mails between Balic and Apple showing the developer informed them of a brute-force attack that shares a stark resemblance to the exploit believed to have been used to leak hundreds of photos of celebrities in the buff a few weeks ago.

developer icloud apple celebgate apple icloud vulnerability hacker brute force hack

In one exchange dated March 26, 2014, Balic explains he was able to try more than 20,000 different passwords on any account which highlighted the fact that there wasn’t any sort of lockout policy in place. The screenshot shows he did receive a reply from someone named Scott at Apple.

The developer also reported the vulnerability through Apple’s official online submission platform.

Typically, a login will only allow for so many failed password attempts before locking the account down to protect against brute-force attacks that use trial-and-error to successfully hack an account.

Balic said Apple repeatedly asked him for more information on the matter and at one point, an Apple Product Security member seemingly dismissed the attack as taking too long to find a valid authentication token for an account.

Apple addressed the matter shortly after, basically admitting that celebrities’ iCloud accounts were compromised although iCloud and Find my iPhone weren't to blame. Instead, Apple said hackers correctly answered security questions to obtain their passwords or they may have been victimized by a phishing scam to obtain user IDs and passwords.

Moving forward, Apple promised to notify users via e-mail and push notification if someone tries to change an account password. The company also enabled two-factor authentication when accessing iCloud accounts from a mobile device.

Permalink to story.

 
Oh look! Theyre protecting icloud accounts now with their imaginations and innovations as well.
 
Apple should also do something about the big vulnerability that their Touch ID brings:Biometrics operated with a password in the OR/disjunction way offers a lower security than when only the password is used.

Biometrics can theoretically be operated together with passwords in two ways, (1) by AND/conjunction or (2) by OR/disjunction. I would appreciate to hear if someone knows of a biometric product operated by (1). The users of such products must have been notified that, when falsely rejected with the devices finally locked, they would have to see the device reset.

Touch ID and other biometric products are operated by (2) so that users can unlock the devices by passwords when falsely rejected, which means that the overall vulnerability of the product is the sum of the vulnerability of biometrics and that of a password. It is necessarily larger than the vulnerability of a password, say, the devices with Touch ID and other biometric sensors are less secure than the devices protected only by a password.
 
Back