Wired: Hackers Used this Police Tool to Steal Celebrity Images from iCloud

You may have already seen or at least heard about the nude Hollywood celebrity images that flooded the Internet over the weekend as some hackers managed to crack the iCloud passwords of the victims. Apple refused to take enough blame in the photo hack, as the company’s carefully crafted response shows. But the reality looks different: What the story and the investigation around it reveal is that Apple’s iCloud isn’t as safe as Apple wants us to believe. So the issue is bigger than we originally thought.

Icloud

As Wired points out, besides the Find My iPhone API vulnerability discovered by security researcher Alexey Troshichev — the man behind iBrute — there is another piece of information that completes the picture of the celebrity nude hack: a piece of software designed to siphon data from iPhones.

The bad news: While you may understand why it is used by law enforcement agencies, this tool is available to everyone for a certain fee ($400 or via the internet).

This software is called EPPB (Elcomsoft Phone Password Breaker). As the conversation on the Anon-IB site — a place where users can post stolen nude images — shows, the hackers are using EPPB to obtain data from iCloud.

So if a hacker can obtain your username and password with iBrute, he/she can log into your iCloud account and steal not just photos but the whole iPhone backup that contains the data you save from your phone.

And to back up the above theory of regular users being targeted by hackers, you only need to head to Anon-IB, where conversations reveal that photo stealing isn’t limited to just a few celebrities.

Apple has allegedly patched the Find My iPhone vulnerability, but hackapp tweeted the other day that Apple’s patch depends on the region. So we can only hope that Apple fixes this issue soon and will focus on protecting users’ privacy as promised.

Want to see more of our stories on Google?

Add iPhone in Canada as a Preferred Source on Google

P.S. Want to keep this site truly independent? Support us by buying us a beer, treating us to a coffee, or shopping through Amazon here. Links in this post are affiliate links, so we earn a tiny commission at no charge to you. Thanks for supporting independent Canadian media!

Subscribe
Notify of
guest
7 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
shuriken48
shuriken48
11 years ago

I am sorry, but this article is worthless… For these hacks to be doable, you need to have a simple passcode, not have the 10 attempts & erase policy turned on and now with 2-factor authentication for Apple IDs, that has to be disabled too. Is Apple also supposed to take us by the hand while crossing the street too! 🙁

Sean
Sean
Reply to  shuriken48
11 years ago

And all three of those things conspired to having hundreds of nude celebrity photos leaked. This article is very useful to those people who didn’t originally have all of this turned on. Don’t be so quick to jump on people, as I’m sure you’ve got holes in your life that could probably be exploited as well.

Andrew Gault
Andrew Gault
Reply to  Sean
11 years ago

Except the article makes it sound like it’s Apples security flaw when it’s actually the users fault for not using all the security options.

Sean
Sean
Reply to  Andrew Gault
11 years ago

Not all users know about all the additional security avail to them. Remember, they’re celebrity iphone users.

TheHutch
TheHutch
11 years ago

I think it is also important to point out that the tool in question can also be used to access other manufacturers devices and services. Including Blackberry.

Z S
Z S
11 years ago

From EPPB’s website: “The given feature is confirmed to work even for acconts with Apple’s two-step verification enabled, but does NOT work for Microsoft Live! accounts that use 2FA.”

I sure as hell hope Apple patches THAT.

BrodieTheDog
BrodieTheDog
Reply to  Z S
11 years ago

Lol. There are even easier ways to hack MS Live

7
0
Would love your thoughts, please comment.x
()
x