Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Apple Says No iCloud Breach in ‘Targeted’ Hack Against Celebrities

Apple said on Tuesday that user accounts belonging to some celebrities were compromised in a targeted attack, but said there were no signs of a wider breach of its iCloud service.

Apple said on Tuesday that user accounts belonging to some celebrities were compromised in a targeted attack, but said there were no signs of a wider breach of its iCloud service.

“After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet,” Apple said in a statement.

“None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud® or Find my iPhone,” the statement continued.

“We are continuing to work with law enforcement to help identify the criminals involved,” Apple said.

“The hack was a two part attack. The first part of the attack was obtaining the email addresses (Apple IDs) of the targets,” Philip Lieberman, President and CEO of Lieberman Software, told SecurityWeek. “The second part of the attack was understanding that the iCloud service had a flaw that allowed an unlimited number of bad password attempts without lockout or alerting. Knowing that the iCloud service did not lock out bad password attempts allowed the attacker to try different lists of works, phrases and character combinations from existing dictionaries of words (dictionary attack) and ultimately use every possible combination of letters, numbers and punctuation via a brute force attack if desired.”

“Apple should have logs containing IP addresses of all parties connecting to their services and using this information, they should be able to quickly identify attackers executing large numbers of logon attempts,” Lieberman continued.

“This does beg the question of Apple’s incompetence in security operations. They should have detected large numbers of logon attempts from a specific address in a short period of time, and their iCloud system should have provided lockout functionality after a fixed number of bad passwords. The technology to protect their clients from these attacks is trivial to implement and costs little to operate.”

“To be clear, Apple was not penetrated, they simply were using a lock on their customer’s accounts that was commercially incompetent,”  Lieberman said. “However, since Apple customers agree to an End User License Agreement (EULA) that effectively limits Apple’s liability to effectively zero, Apple has little to no direct financial damage, but reputation damage could be significant. Users should remember that they are using a consumer grade service with Apple and that much more secure systems exist for file storage and should be used for sensitive data.”

Advertisement. Scroll to continue reading.

Apple advised users to always use a strong password and enable two-step verification.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is founder and director of several leading cybersecurity industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

The US arm of networking giant TP-Link has appointed Adam Robertson as Director of Information and Security.

Cyber exposure management firm Armis has promoted Alex Mosher to President.

Software giant Atlassian has named David Cross as its new CISO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.