2014年9月2日星期二

The control Tool with the aim of Pervs apply to slip exposed Pics From Apple’s iCloud

The control Tool with the aim of Pervs apply to slip exposed Pics From Apple’s iCloud

Having the status of exposed superstar photos spilled against the jungle on top of the weekend, blame in favor of the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, whose security flaws possibly will arrange made with the aim of cracking exploit doable now the head place. But single step now the hackers’ sext-stealing playbook has been ignored—a part of a set of software designed to accede to cops and spies tap data from iPhones, but is as a substitute being used by pervy criminals themselves.

On the jungle forum Anon-IB, single of the nearly everyone in style unknown image boards in favor of redeployment stolen exposed selfies, hackers openly discuss using a part of a set of software called EPPB or else Elcomsoft Phone Password surf to download their victims’ data from iCloud backups. With the aim of software is sold by Moscow-based forensics dense Elcomsoft and intended in favor of government agency customers. Now combination with iCloud credentials obtained with iBrute, the password-cracking software in favor of iCloud released on Github on top of the weekend, EPPB lets someone mimic a victim’s iPhone and download its chock-a-block backup more willingly than the supplementary partial data straightforward on iCloud.Com. And having the status of of Tuesday, it was still being used to slip instructive photos and advertise them on Anon-IB’s forum.

“Use the script to hack her passwd…use eppb to download the backup,” wrote single unknown user on Anon-IB explaining the process to a less-experienced hacker. “Post your wins at this point ;-)”

Apple’s security nightmare began on top of the weekend, as soon as hackers began leaking exposed photos with the aim of integrated shots of Jennifer Lawrence, Kate Upton, and Kirsten Dunst. The security cooperation quickly pointed fingers by the side of the iBrute software, a tool released by security researcher Alexey Troshichev designed to take pro of a flaw now Apple’s “Find My iPhone” element to “brute-force” users’ iCloud passwords, cycling through thousands of guesses to crack the savings account.

If a hacker can gain a user’s iCloud username and password with iBrute, he or else she can log now to the victim’s iCloud.Com savings account to slip photos. But if attackers as a substitute mimic the user’s device with Elcomsoft’s tool, the desktop purpose allows them to download the full iPhone or else iPad backup having the status of a single folder, says Jonathan Zdziarski, a forensics consult and security researcher. With the aim of gives the intruders access to far supplementary data, he says, counting videos, purpose data, contacts, and text messages.

On Tuesday afternoon, Apple issued a statement calling the security debacle a “very embattled attack on user names, passwords and security questions.” It added with the aim of “none of the hand baggage we arrange investigated has resulted from some breach now some of Apple’s systems counting iCloud® or else obtain my iPhone.”

But the conversations on Anon-IB become make the photo-stealing attacks aren’t partial to a a small amount of celebrities. And Zdziarski argues with the aim of Apple possibly will be located essential a “breach” having the status of not counting a password-guessing attack like iBrute. Based on his analysis of the metadata from leaked photos of Kate Upton, he says he’s gritty with the aim of the photos came from a downloaded backup with the aim of would be located unswerving with the apply of iBrute and EPPB. If a chock-a-block device backup was accessed, he believes the put your feet up of the backup’s data possibly will still be located possessed by the hacker and may well be located used in favor of blackmail or else result other targets. “You don’t dig up the same level of access by logging into someone’s [web] savings account having the status of you can by emulating a phone that’s liability a restore from an iCloud backup,” says Zdziarski. “If we didn’t arrange this law enforcement tool, we might not arrange the leaks we had.”

Elcomsoft is a short time ago single of a digit of forensics firms like Oxygen and Cellebrite with the aim of reverse engineer smartphone software to allow government investigators to dump the devices’ data. But Elcomsoft’s plan seems to be located the nearly everyone in style surrounded by Anon-IB’s crowd, someplace it’s been used in favor of months previous to the nearly everyone current leaks, likely now hand baggage someplace the hacker was able to gain the target’s password through funds other than iBrute. Many “rippers” on Anon-IB offer to pull out exposed photos on behalf of some other user who possibly will know the target’s Apple ID and password. “Always released, fast and discreet. Command become it alot easier if you arrange the password,” writes single hacker with the email direct eppbripper@hush.Ai. “Willing to tear no matter which iclouds – gf/bf/mom/sister/classmate/etc!! Pics, texts, remarks and so on!”

Single of Anon-IB’s ripper who uses the come to grips with cloudprivates wrote now an email to WIRED with the aim of he or else she doesn’t consider downloading archive from an iCloud backup “hacking” if it’s finished on behalf of an extra user who food a username and password. “Dunno not far off from others but I am too indolent to look in favor of accounts to hack. This way I a short time ago provide a service to someone with the aim of wants the data inedible the iCloud. In favor of all I know they own the iCloud,” cloudprivates writes. “I am not hacking no matter which. I simply replica data from the iCloud using the user christen and password with the aim of I am specified. Software from elcomsoft does this.”

Elcomsoft’s plan doesn’t require impermeable of law enforcement or else other government credentials. It overheads having the status of much having the status of $399, but copy illegally copies are without restraint to be had on bittorrent sites. And the software’s marketing language sounds nigh on tailor-made in favor of Anon-IB’s rippers.

“All that’s desired to access online backups stored now the cloud service are the imaginative user’s credentials counting Apple ID…accompanied with the corresponding password,” the company’s website reads. “Data can be located accessed lacking the consent of awareness of the device proprietor, making Elcomsoft Phone Password surf an ideal solution in favor of law enforcement and cleverness organizations.”

Elcomsoft didn’t respond to a demand in favor of comment.

On Monday, iBrute creator Troshichev illustrious with the aim of Apple had released an bring up to date in favor of obtain My iPhone designed to predicament the flaw exploited by iBrute. “The stop of fun, Apple arrange a short time ago patched,” he wrote on Github. But Anon-IB users continued to discuss stealing data with iBrute now combination with EPPB on the forum Tuesday, suggesting with the aim of the predicament has yet to be located practical to all users, or else with the aim of stolen credentials are still being used with Elcomsoft’s plan to tap just starting out data. Apple didn’t without more ado respond to WIRED’s demand in favor of advance comment, though it says it’s still investigating the hack and working with law enforcement.

In favor of Apple, the apply of government forensic tools by criminal hackers raises questions not far off from how helpful it possibly will be located with Elcomsoft. The Russian company’s tool, having the status of Zdziarski describes it, doesn’t depend on some “backdoor” agreement with Apple and as a substitute compulsory Elcomsoft to fully reverse engineer Apple’s protocol in favor of communicating linking iCloud and its iOS policy. But Zdziarski argues with the aim of Apple may well still arrange finished supplementary to become with the aim of reverse engineering supplementary grueling or else intolerable.

“When you arrange third parties masquerading having the status of hardware. It really opens up a vulnerability now provisions of allowing all of these diverse companies to keep on to interface with your structure,” he says. “Apple may well take steps to close with the aim of inedible, and I think they ought to.”

The detail with the aim of Apple isn’t complicit now law enforcement’s apply of Elcomsoft’s in favor of surveillance doesn’t become the tool some a smaller amount unsafe, argues Matt rage, a central processing unit science professor by the side of the University of Pennsylvania and frequent critic of government intelligence work methods. “What this demonstrates is with the aim of even lacking graphic backdoors, law enforcement has powerful tools with the aim of might not every time stay inside law enforcement,” he says. “You arrange to ask if you trust law enforcement. But even if you organize trust law enforcement, you arrange to ask whether other natives command dig up access to these tools, and how they’ll apply them.”
Related : http://20578301.blog.hexun.com/     

没有评论:

发表评论