This afternoon, Apple confirmed that stolen and leaked private photos of several celebrities were not due to a breach in its iCloud nor Find My iPhone services. Speculation swirled over just how the attackers accessed the accounts of Jennifer Lawrence, Jenny McCarthy, Rihanna, Kate Upton, Mary E Winstead, and others.
In a statement issued today, Apple said:
"When we learned of the theft, we were
outraged and immediately mobilized Apple's engineers to discover the
source. Our customers’ privacy and security are of utmost importance to
us. After more than 40 hours of investigation, we have discovered that
certain celebrity accounts were compromised by a very targeted attack on
user names, passwords and security questions, a practice that has
become all too common on the Internet. None of the cases we have
investigated has resulted from any breach in any of Apple’s systems
including iCloud or Find my iPhone. We are continuing to work with law
enforcement to help identify the criminals involved."
Apple recommends users create strong passwords and use two-factor authentication, which is an option for Apple ID accounts. Apple did not comment on the reported flaw nor did it respond to questions about it via a media inquiry.
One security expert says he tested whether AppleID would lock him out after a certain number of attempts after hearing about the possible patch by Apple: It did. "After ten attempts, it locked me out," says Rik Ferguson, global vice president of security research at Trend Micro. He was unable to confirm whether Apple's authentication service had always done so, or whether this was due to a fix by Apple in the wake of the celeb hacks.
Either way, brute-forcing would require knowing the email address of the target, he says.
It's not surprising that most consumers and celebrities don't opt for the second factor of authentication since it's not required, experts say. And weak passwords most likely played a major role in the attack, they say.
"This breach could have been prevented if iCloud required users to use a two-factor authentication to access their accounts. This will require users to enter a numerical code that is sent to their phone or another device, in addition to using their regular password," says Vijay Basani, CEO of EiQ Networks. "Since numerical code always changes, it makes it difficult for the hackers to gain access [and breach the account], even if they can guess the password."