There’s lots of interest in the recent iCloud incident, where apparently several “celebrity” accounts were compromised.
Sorry to say, it’s not a rumour.Â It’s also something that could and should have been prevented.Â It turns out that the API for the “Find My iPhone” app did not have protections against brute force attacks.
This, combined with the first couple hundred lines of a common password dictionary (often downloaded as the filenameÂ “500 worst passwords”) resulted in some targeted accounts being compromised.Â And of course once an account password is successfully guessed, all iCloud data for that account is available to the attackers.Â So no rocket science, no uber hacking skills.Â Just one exposed attack surface, basic coding skills and some persistence.
Having gone through that password file, you really wonder how much folks using any of those passwords valued their data in the first place.
Apple quickly fixed the vulnerability, so it is no longer in play (unless your account was compromised prior to the mitigation and you haven’t changed your password).Â The code is on github if you are interested.
This just reinforces the common theme that – to put it mildly – trusting personal data to simple passwords is not recommended.Â If you can’t use complex passwords (for me, that’s greater than 15 characters) or don’t have a second factor, then don’t use the service.
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.