Attacks/Breaches
7/22/2013
10:26 AM
50%
50%

Apple Developer Forum Hack Explained

Turkish security researcher said his bug report wasn't malicious, disputes Apple's claim that attack compromised information on iOS and Mac OS X developers.

Apple said Sunday that its developer portal was hacked Thursday, putting the personal details of 275,000 third-party developers at risk. Some portal members have already reported seeing unauthorized password-reset requests for their Apple IDs.

Apple said the developer portal will remain offline, pending security improvements. As of Sunday, the members' area of the Apple developer portal had been replaced with this message: "Last Thursday, an intruder attempted to secure personal information of our registered developers from our developer website. Sensitive personal information was encrypted and cannot be accessed, however, we have not been able to rule out the possibility that some developers' names, mailing addresses and/or email addresses may have been accessed," it said.

"In the spirit of transparency, we want to inform you of the issue. We took the site down immediately on Thursday and have been working around the clock since then," said Apple.

[ So much for the myth that Apple has Fort Knox-level security. See Hangover Won't End: More Mac Malware Found. ]

But a London-based Turkish information security researcher who's claimed credit for disclosing the developer portal flaws to Apple said his effort wasn't meant to be malicious. "Apple!! This is definitely not an [sic] hack attack !!! I am not an hacker, I do security research" tweeted the London-based security researcher Ibrahim Balic, who runs a digital marketing agency.

"My intention was not attacking. In total I found 13 bugs and reported [them] directly one by one to Apple straight away," Balic told the Guardian. "Just after my reporting [the] dev center got closed. I have not heard anything from them, and they announced that they got attacked. My aim was to report bugs and collect the datas [sic] for the purpose of seeing how deep I can go with it." According to The Hacker News, Badic demonstrated the exploit against 73 of his own employees' Apple IDs. But he said the bugs would have given him access to information on at least 100,000 Apple developers.

Seeking to address the apparent hacking accusation, Balic on Sunday posted a YouTube video showing a "data leaks user information" bug report to Apple, dated early Friday morning, London time. The video also appeared to show him being able to access other portal members' Apple IDs and email addresses.

Balic's YouTube post alone drew angry comments from other developers. "Ibrahim next [time] you do this obscure the personal information of the users accounts. Saying you will delete ... data is great except for anyone being able to do a screen grab on the accounts you did display," read one comment. Another added: "This guy should be sued for displaying personal data."

The timing of Balic's bug report lines up with Apple taking the developer forum offline Thursday. But it's not clear if Balic's bug report was posted to a forum accessible by anyone who was a registered Apple developer. If so, other developers could have capitalized on the bugs he discovered.

As of Monday, Apple's developer forum, where software development kits and beta versions of iOS 7 and Mac OS X Mavericks could be downloaded, remained unavailable. "We're completely overhauling our developer systems, updating our server software and rebuilding our entire database," said Apple's outage notice, which was emailed to developers Sunday. Apple also said that it would extend the membership period for any developer whose membership was set to expire while the portal was offline, and promised that their iOS and Mac apps would remain available for sale.

One risk from Apple's developer forums being compromised is that members might be subjected to phishing attacks. If successful, those developers' accounts could be compromised by attackers, who might create malicious versions of the apps and submit them to Apple's App Store.

Despite Apple promising transparency over the temporary portal shutdown, prior to Sunday its developer forum had displayed a message saying only that the outage was due to "maintenance taking longer than expected," which drew criticism from third-party developers. Instapaper creator Marco Arment, for example, said presciently on his blog Sunday that Apple had most likely either experienced a data loss or "a security breach, followed by cleanup and increased defenses." He added: "The longer it goes, especially with no statements to the contrary, the more this becomes the most likely explanation."

Apple's third-party developers aren't the only people to have had their personal details exposed in recent days. Software development firm Canonical, which supports the free, open source Debian GNU/Linux distribution Ubuntu, said Saturday that it had taken the Ubuntu forums offline the same day, after they were replaced by an image of an assault-weapon-wielding Tux, the Linux mascot, and "@Sputn1k_" label, which was a name-drop from the hacker responsible.

"Unfortunately the attackers have gotten every user's local username, password and email address from the Ubuntu Forums database," read a security warning posted on the forums' site. Thankfully, "the passwords are not stored in plain text, they are stored as salted hashes," it said. Even so, the company recommended that anyone who had reused the password on another site change it there immediately.

A Twitter account in the name of @Sputn1k_ had been suspended Monday. But a Sunday tweet to the account read: "You can stop worrying about your passwords. Yes, they were encrypted." Meanwhile, a longer post from "Sput," made via TwitLonger, noted that the passwords had been encrypted using vBulletin's default hashing algorithm of MD5 plus salt. "Whilst it may not be the strongest, when you're dealing with 1.8m users it would take a very long time to get anywhere with the hashes," said Sput.

"You don't have to worry about a DB leak. That isn't how I like to do things," he promised.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.