Pages: [1]   Go Down
  Print  
Author Topic: Hacker Team Claims Compromise of Apple's iCloud and Activation Lock, Possibly via SSL Bug [Updated]  (Read 368 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: May 27, 2014, 02:00:12 pm »

Hacker Team Claims Compromise of Apple's iCloud and Activation Lock, Possibly via SSL Bug [Updated]

icloud_icon" width="164" height="164" class="alignright size-full wp-image-385588A pair of hackers from the Netherlands and Morocco, identifying themselves as AquaXetine and MerrukTechnolog, claim to have compromised the security of Apple's iCloud system for locking iOS devices.
 
 The hack will unlock stolen iPhones by bypassing Activation Lock, making it possible for thieves to resell the phones easily on the black market, reports Dutch publication De Telegraaf [Google Translate]. It also may provide hackers with access to Apple ID passwords and other personal information stored in Apple's iCloud service.
 
 The hackers reportedly worked on the vulnerability for five months, studying the transmission of data between iPhone handsets and Apple's iCloud services. The pair claim to be able to unlock a locked iPhone by placing a computer between the iPhone and Apple's servers. In this configuration, the iPhone mistakenly identifies the hacker's computer as one of Apple's servers and follows instructions provided by the nefarious computer to reverse activation lock on the handset.
 
 While the hackers did not reveal precise information on how their intercepting computer can spoof Apple's iCloud activation servers, it appears that they may be taking advantage of an SSL bug that is present in iTunes for Windows, as noted by iPhone in Canada, who spoke to security researcher Mark Loman about the issue. The previously disclosed issue was fixed in iOS 7.0.6 and OS X 10.9.2, but it appears that iTunes for Windows is still affected.
After looking into some claims of the jailbreak community, Mark Loman decided to do some investigating of his own and made a shocking discovery. SSL has two tasks: one, to verify communication with the intended server; and two, to prevent manipulation.
 
 “The problem is with verifying the certificate. Apple appears to have deliberately left out this essential step required for proper secure communication. They fixed it last month for iOS but forgot to fix it for iTunes. But the jailbreak community is already making use of it — which is how I figured it out.”
The vulnerability reportedly allows hackers to intercept Apple ID credentials, which can then be used to unlock iOS devices that have been locked after having been lost or stolen.
Actually, the data IS encrypted. But when an attacker strips SSL during a so-called man-in-the-middle attack the AppleID account name and password can be extracted as they are sent in plain text inside SSL, Mark Loman said in an email sent to iPhone in Canada.
Using this technique, the hackers claim to have unlocked 30,000 iPhones in the past few days. The group allegedly contacted Apple about this vulnerability in March, but Apple never responded, prompting the hackers to go public with the information.
 
 Update 10:43 AM: One of the hackers has denied that the bypass involves an SSL bug.
 
 
 Recent Mac and iOS Blog Stories
 • Apple Among Highest-Ranking Brands in Latest Workers' Rights Report
 • Southwest Airlines Updates iOS App, Enables Mobile Boarding Pass Feature at 28 Airports
 • Google Beats Out Apple as World's Most Valuable Brand
 • Sales Ban of Older Samsung Galaxy Phones Upheld by Dutch Court
 • Verizon Debuts XLTE, Doubling Bandwidth for iPhone 5s, 5c
 • Waterfield Designs Debuts 'Mac Pro Go Case' for Transporting 2013 Mac Pro
 • OS X 10.9.3 Boosts Maximum VRAM of Recent Retina MacBook Pro and MacBook Air Models
 • Groupon Introduces Gnome, an iPad-Powered Point-of-Sale System
<img width='1' height='1' src='http://rss.feedsportal.com/c/35070/f/648327/s/3aad32a1/sc/15/mf.gif' border='0'/><br clear='all'/>

<a href="http://da.feedsportal.com/r/195506196317/u/49/f/648327/c/35070/s/3aad32a1/sc/15/rc/1/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/195506196317/u/49/f/648327/c/35070/s/3aad32a1/sc/15/rc/1/rc.img" border="0"/>[/url]
<a href="http://da.feedsportal.com/r/195506196317/u/49/f/648327/c/35070/s/3aad32a1/sc/15/rc/2/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/195506196317/u/49/f/648327/c/35070/s/3aad32a1/sc/15/rc/2/rc.img" border="0"/>[/url]
<a href="http://da.feedsportal.com/r/195506196317/u/49/f/648327/c/35070/s/3aad32a1/sc/15/rc/3/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/195506196317/u/49/f/648327/c/35070/s/3aad32a1/sc/15/rc/3/rc.img" border="0"/>[/url]

<img src="[url]http://da.feedsportal.com/r/195506196317/u/49/f/648327/c/35070/s/3aad32a1/sc/15/a2.img" border="0"/>[/url]<img width="1" height="1" src="http://pi.feedsportal.com/r/195506196317/u/49/f/648327/c/35070/s/3aad32a1/sc/15/a2t.img" border="0"/><div class="feedflare">
<img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=yIl2AUoC8zA" border="0"></img>[/url] <img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=6W8y8wAjSf4" border="0"></img>[/url] <img src="[url]http://feeds.feedburner.com/~ff/MacRumors-Front?d=qj6IDK7rITs" border="0"></img>[/url]
</div><img src="http://feeds.feedburner.com/~r/MacRumors-Front/~4/CsH-Ybl1g84" height="1" width="1"/>

Source: Hacker Team Claims Compromise of Apple's iCloud and Activation Lock, Possibly via SSL Bug [Updated]
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: