Home Tags Victoria Justice
Tag: Victoria Justice
NEWS ANALYSIS: An alleged iCloud brute force vulnerability is plugged, but what does it say about the state of cloud security? Over the weekend, attackers posted explicit pictures of Hollywood celebrities including Oscar winner Jennifer Lawrence, allegedly obtained via a vulnerability in Apple's iCloud service. The pictures were posted on the 4chan site, where users often share explicit pictures. The original poster claimed to have additional photos for which payment was being sought. Spammers tend to attempt to get naive users to click on links including explicit pictures, leading some people to initially think that the images were fake. Some of the celebrities confirmed the pictures were real, however, while others said they were fake. "Knowing those photos were deleted long ago, I can only imagine the creepy effort that went into this," actress Mary Winstread tweeted. "Feeling for everyone who got hacked." According to multiple reports, a spokesperson for Lawrence also confirmed the authenticity of the pictures and expressed anger at the flagrant violation of privacy. Not all the pictures, however, are authentic. "These so called nudes of me are FAKE people," actress Victoria Justice tweeted. "Let me nip this in the bud right now. *pun intended*" While the actual root cause of the picture leak has not authoritatively been confirmed, there is widespread speculation that the pictures were stolen from Apple's iCloud service. "We take user privacy very seriously and are actively investigating this report," Nat Kerris, an Apple spokeswoman, told NBC News . Actress Kirsten Dunst, pictures of whom were also released in the attack, took specific aim at iCloud too. "Thank you iCloud," Dunst tweeted. The NBC News report noted that the FBI is actively investigating the incident. The alleged iCloud flaw is linked to a possible brute force vulnerability in the platform. In a brute force attack, the hacker uses an automated tool to guess username and password combinations in an attempt to gain access. Specifically, an iBrute brute force attack may have been responsible for the celebrity picture leak. A proof of concept outlining the attack was publicly posted on the Github code sharing site. "It uses Find My Iphone service API, where bruteforce protection was not implemented," the iBrute Github page states. The Find My iPhone service is Apple's service that is supposed to help users locate a lost or stolen iPhone device. While Apple has not publicly confirmed that there is any issue, the iBrute Github page notes that Apple has now patched the flaw. This isn't the first time in 2014 that a vulnerability in Apple's Find My iPhone service has been implicated as the root cause of an attack against users. In May, Apple users in Australia had their iOS devices held for ransom by an attacker who allegedly hacked the Find My iPhone service. Cloud Storage Security If Apple's iCloud is in fact at the root cause of this latest attack, it raises some serious concerns about the state of cloud storage security. Are files stored in the cloud more or less secure than files stored anywhere else? In this case, if in fact it was a brute force attack, should the cloud service be blamed for not providing adequate protection? The simple truth is that cloud storage is only as secure as the access methods that are deployed. That is, even if the cloud service itself is potentially at risk, if the system has multiple layers of authentication, a simple brute force attack, which only yields a username/password combination, will not be successful. If users employ two-factor authentication—a second password (or factor)—a simple brute force attack will not work. Apple does in fact offer two-factor authentication for its AppleID accounts, which are used to access the iCloud service. That said, it's important to remember that this incident involved theft of personal information. Even if the users didn't have two-factor authentication, and even if the cloud service didn't have proper brute force protection, a crime did occur. Users and cloud vendors need to do their part to secure users, and in this case, law enforcement now needs to do its part to bring those responsible to justice. Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.
Hundreds of revealing photographs of female celebrities have been leaked online, reportedly after Apple’s iCloud service was hacked. Jennifer Lawrence, Kirsten Dunst and Ariana Grande are said to be among the celebrities shown in the photographs posted on web forum 4chan. Anonymous 4chan users claim the images had been taken from the celebrities’ iCloud accounts, according to The Verge. Apple’s iCloud service is designed to enable iPhone, iPad and Mac users to synchronise images, settings, calendar information and other data between devices. But concerns over iCloud security have led many enterprises to implement mobile device management systems that enable administrators to enforce policies which control what data is passed on to iCloud. More than 100 A-list celebrities are thought to have been targeted, including reality TV star Kim Kardashian, singer Rihanna and models Candice Swanepoel, Cara Delevingne and Kelly Brook. It is unclear when the iCloud service was compromised as one celebrity whose photos were stolen, Mary Elizabeth Winstead, said the images concerned had been deleted years ago. This either means the hacker has been collecting the images for some years, or the images are still available in iCloud to those who know where to find them. While Winstead and Lawrence have confirmed the pictures of them are real, Ariana Grande and Victoria Justice have said the images are fake. A spokesperson for Jennifer Lawrence warned that anyone posting the stolen pictures will be prosecuted. In 2012, a man was sentenced to 10 years in prison for hacking the private email accounts of celebrities including Mila Kunis and Scarlett Johansson. Apple has so far not responded to media requests for comment on the alleged compromise of its iCloud service. Email Alerts Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox. By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy Read More Related content from ComputerWeekly.com RELATED CONTENT FROM THE TECHTARGET NETWORK