Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Apple Not Hacked In Celebrity Nude Photo Breaches
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
9/5/2014 | 4:08:44 AM
Re: the responsibility is on the user
Regarding the incident, despite Apple denies any exploitation of the mentioned flaw we must be conscious that the vulnerability was anyway present at the time of the attack.

I afraid the hack is much more extended and may have impacted many other Apple users. Not only celebrities are exposed to such risks. No matter if you are a manager or a common individual, your data are a precious commodity in the cybercrime ecosystem. For this reason, it is important to know the main cyber threats and the principal mitigation practices. This could be just the beginning. 

I think that all principal storage service providers are under attack and need to improve their security implementing further countermeasures.



User Rank: Apprentice
9/4/2014 | 6:57:45 PM
Just a thought...
Call me crazy, but here's a thought... DON'T TAKE NAKED PICTURES OF YOURSELF WITH YOUR PHONE! So far, I've read lots of technical explanations for how this dastardly deed could have been perpitrated, yet no one has pointed out the obvious; if you are a celebrity, you are a target. Whether it's the National Enquirer, Russian techno-perverts or horny teenagers in Somalia... accounts owned by celebrities are always going to be ransacked. The real question is, ESPECIALLY in lieu of the terrifying data provided by Eric Snowden proving beyond ANY doubt that cell phones, and almost anything else with a power cord,  are absolutely 150% compromised, "What kind of idiot takes naked pictures of themselves with their cell phones"? It takes a special kind of stupid to do that, and somehow not expect to see yourself on every porn site on the net by sundown. Apple does need to own it's responsibility for its screen door security policies, but lets not lose sight of the fact that if you weren't taking dirty pictures of yourself in the first place, you wouldn't be in the predicament. That's the responsibility to be owned by our celebrity "victims". Maybe they should consult with Bret Favre regarding image damage control related to cellular phone services. I'm sorry, once everybody lawyers up and the lawsuits start flying, I don't think Apple should have to pay damages to celebrity morons participating in questionable behaviors...
User Rank: Apprentice
9/4/2014 | 3:29:15 PM
Secure Camera on nCrypted Cloud
Thank you for mentioning us.


We do way more than protect naked photos, but since that is the discussion, you can use our "secure camera" to take photos on IOS devices (ANDROID COMING).

The photos do NOT go into the standard camera roill but into an encrypted camera roll.

The photos are encrypted using 256 bit AES zip files as an enveloping technology.

Want to share those naked photos with someone?  No problem we do it seamlessly.

Want to revoke that persons access (even after they sync it to other machines)?   No problem, we take care of it.


Try us www.ncryptedcloud.com

Robert McDougal
Robert McDougal,
User Rank: Ninja
9/3/2014 | 2:16:45 PM
Re: the responsibility is on the user
Unfortunately, I did not document my efforts.  However, it appears that some people in this reddit thread had the same testing experience that I did myself.

User Rank: Ninja
9/3/2014 | 11:32:33 AM
Re: the responsibility is on the user
That is interesting. Based on your own testing, it is evident that at the time of the breach, there was no lockout provision in a brute force attack mitigation strategy. That in itself violates well known security practices. Also interesting is that Apple claims a two-step verification process, as stated in their media advisory, would protect users from this type of attack. Are they deliberately misleading the public? If you have documented information regarding the test results that you conducted personally, perhaps you should make that more public, to clarify the situation. There has to be transparency somewhere, right?

Although I am not a huge fan of Apple products in the enterprise, I do love their mobile devices. Also, I prefer not to use iCloud because cloud services in general scare the daylights out of me. I suppose this event justifies that reservation.
Robert McDougal
Robert McDougal,
User Rank: Ninja
9/3/2014 | 11:09:47 AM
Re: the responsibility is on the user
A couple of points.

Firstly, I am highly disappointed with Apple's stance on this issue. This IS a breach of their iCloud service. Over the weekend I did testing on my own iCloud account using this python script. I had a word list of 1000 passwords and buried my password at the end of the list. The script was initially able to find my password but later in the day on Sunday, the script was halted after 10 tries. From my testing it appears there was indeed a flaw that Apple quietly patched over the weekend.

Secondly, Apple's two factor authentication does not protect your iCloud backup. Currently, Apple's two factor authentication only protects My Apple ID sign-ins and purchases from the App Store.
User Rank: Ninja
9/3/2014 | 9:00:02 AM
Re: the responsibility is on the user
It never ceases to amaze me how little effort people put into protecting themselves or their privacy. Two Factor Authentication (2FA) is available in Apple's iCloud service, and I believe none of those celebrities took advantage of that security measure. The reason probably lies in their mistaken belief that having a password is enough to secure their accounts. So it comes down to how much they want to protect their privacy, and how they balance that desire with the complexity of a secure configuration. It really is a personal risk analysis. Do they want the "hassle" of remembering a complex password and on top of that, a second authentication factor to protect their privacy, or risk exposure? Well I am willing to bet that a lot more people are opting for that 2FA now! I view this as a microcosm of the security environment of organizations. How many organizations out there are complacent on their security? It usually takes a breach in their industry before they take notice and scramble to enforce rigid security.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
9/3/2014 | 7:44:43 AM
Re: the responsibility is on the user
@Bkosh I suspect a lot of Hollywood publicists and attorneys are adding internet privacy protection to their resumes and job descriptions. 
User Rank: Apprentice
9/2/2014 | 7:35:26 PM
the responsibility is on the user
There is a secure camera feature for iphones that anyone can use and it works with Dropbox free. A company called nCrpyted Cloud developed this it for federal law enforcement and healthcare providers who need to protect photos of patients. But celebrities or anyone who needs privacy in the cloud can access it. Perhaps celebrities need to make privacy not just publicity someone's job and learn about these tools?

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The Promise and Reality of Cloud Security
Cloud security has been part of the cybersecurity conversation for years but has been on the sidelines for most enterprises. The shift to remote work during the COVID-19 pandemic and digital transformation projects have moved cloud infrastructure front-and-center as enterprises address the associated security risks. This report - a compilation of cutting-edge Black Hat research, in-depth Omdia analysis, and comprehensive Dark Reading reporting - explores how cloud security is rapidly evolving.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-02-04
There are issues with the AGE drivers for Golang and Python that enable SQL injections to occur. This impacts AGE for PostgreSQL 11 & AGE for PostgreSQL 12, all versions up-to-and-including 1.1.0, when using those drivers. The fix is to update to the latest Golang and Python drivers in addition ...
PUBLISHED: 2023-02-04
An improper neutralization of input during web page generation ('Cross-site Scripting') [CWE-79] vulnerability in Sling App CMS version 1.1.4 and prior may allow an authenticated remote attacker to perform a reflected cross-site scripting (XSS) attack in multiple features. Upgrade to Apache Sling Ap...
PUBLISHED: 2023-02-04
hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
PUBLISHED: 2023-02-04
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1.
PUBLISHED: 2023-02-04
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to v1.5.1.