Everything wrong with the cloud, security, online privacy, a

Post » Thu Aug 09, 2012 2:58 pm

Mat Honan had a horrible weekend. He had his digital identity striped, stolen, and tarnished. How did this happen? A couple of guys didn't like him much, a little bit of easily available information, and some social engineering.

Calling up Amazon, the group was able to use some information they gathered doing research on the topic to reset his Amazon password. From there they got a few digits of his credit card information. Not too bad, right? Wrong. They took this information and gave it to Apple along with some other information they were able to aquire. Now they had access to his iCloud and iTunes account. They wiped his iPhone and iPad clean as well as trashed his Macbook.... but weren't done yet. Going off of this momentum they turned to attack his email. They had tons of personal information at this point as well as his personal email address he had tied to iCloud. Resetting his gmail password was a breeze. After this they went to attack his social network sites, since now they had access to his email, a simple password reset request was all they needed. Soon after they used the likes of his Twitter account to post homophobic and racist comments. Once they were done they started deleting everything they could to make it so Mat couldn't put his digital life together.

http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/

In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.


The disconnect exposes flaws in data management policies endemic to the entire technology industry, and points to a looming nightmare as we enter the era of cloud computing and connected devices.

This isn’t just my problem. Since Friday, Aug. 3, when hackers broke into my accounts, I’ve heard from other users who were compromised in the same way, at least one of whom was targeted by the same group.

Moreover, if your computers aren’t already cloud-connected devices, they will be soon. Apple is working hard to get all of its customers to use iCloud. Google’s entire operating system is cloud-based. And Windows 8, the most cloud-centric operating system yet, will hit desktops by the tens of millions in the coming year. My experience leads me to believe that cloud-based systems need fundamentally different security measures. Password-based security mechanisms — which can be cracked, reset, and socially engineered — no longer suffice in the era of cloud computing.

At 4:33 p.m., according to Apple’s tech support records, someone called AppleCare claiming to be me. Apple says the caller reported that he couldn’t get into his .Me e-mail — which, of course was my .Me e-mail.
In response, Apple issued a temporary password. It did this despite the caller’s inability to answer security questions I had set up. And it did this after the hacker supplied only two pieces of information that anyone with an internet connection and a phone can discover.
At 4:50 p.m., a password reset confirmation arrived in my inbox. I don’t really use my .Me e-mail, and rarely check it. But even if I did, I might not have noticed the message because the hackers immediately sent it to the trash. They then were able to follow the link in that e-mail to permanently reset my AppleID password.
At 4:52 p.m., a Gmail password recovery e-mail arrived in my .Me mailbox. Two minutes later, another e-mail arrived notifying me that my Google account password had changed.
At 5:02 p.m., they reset my Twitter password. At 5:00 they used iCloud’s “Find My” tool to remotely wipe my iPhone. At 5:01 they remotely wiped my iPad. At 5:05 they remotely wiped my MacBook. Around this same time, they deleted my Google account. At 5:10, I placed the call to AppleCare. At 5:12 the attackers posted a message to my account on Twitter taking credit for the hack.
By wiping my MacBook and deleting my Google account, they now not only had the ability to control my account, but were able to prevent me from regaining access. And crazily, in ways that I don’t and never will understand, those deletions were just collateral damage. My MacBook data — including those irreplaceable pictures of my family, of my child’s first year and relatives who have now passed from this life — weren’t the target. Nor were the eight years of messages in my Gmail account. The target was always Twitter. My MacBook data was torched simply to prevent me from getting back in.
Lulz.

Since then http://www.wired.com/gadgetlab/2012/08/amazon-changes-policy-wont-add-new-credit-cards-to-accounts-over-the-phone/

Apple has put a "suspension" on the same, but the policy is still in place.

There's nothing overly impressive about these attacks. There were a few things Mat could have done to mitigate the risk, but overall his practices were what could be called "good" and definitely "above average", but it wasn't enough.

The flaws? The Cloud and proprietary systems. Had it not been for all the hooks in his personal life and things like Apples "Walled Garden" the damage would have been much less. If there were viable alternatives on Apple's products to Find my iPhone and iCloud, the ability to carry out pinpointed attacks like these would be significantly weakened as the homogeneity needed to make such attacks viable wouldn't exist as there'd be competition. Apple, however, forbids such competition on their platforms and nothing offers the complete set of features iCloud and Find My iPhone do (at least not without a jailbroken iPhone).

Anyway, it's a good read and a nice eye-opener
User avatar
Darrell Fawcett
 
Posts: 3336
Joined: Tue May 22, 2007 12:16 am

Post » Thu Aug 09, 2012 9:17 am

I wouldn't blame the cloud or anything. People who get hacked are usually doing stupid things on the internet. Don't do stupid things and you won't get hacked. Never been hacked, don't see how a "random" person just gets hacked out of the blue.

If anything, more services can add a mobile authenticator like Blizzard does.
User avatar
Jessie Butterfield
 
Posts: 3453
Joined: Wed Jun 21, 2006 5:59 pm

Post » Thu Aug 09, 2012 2:05 pm

Password resets and secret questions are the bane of security.
User avatar
Cody Banks
 
Posts: 3393
Joined: Thu Nov 22, 2007 9:30 am

Post » Thu Aug 09, 2012 6:41 am

Man, if this happened to me I'd be devastated. I've never been one for cloud anyways. I feel bad for the guy.
User avatar
Alyna
 
Posts: 3412
Joined: Wed Aug 30, 2006 4:54 am

Post » Thu Aug 09, 2012 8:39 am

http://apple.slashdot.org/story/12/08/06/1533233/wozniak-predicts-horrible-problems-with-the-cloud

I wouldn't blame the cloud or anything. People who get hacked are usually doing stupid things on the internet. Don't do stupid things and you won't get hacked. Never been hacked, don't see how a "random" person just gets hacked out of the blue.
Sorry, but you have no idea how technology works.

Password resets and secret questions are the bane of security.
http://tinyurl.com/cnhgz8z

You know that it's now possible to program http://it.slashdot.org/story/11/06/05/2028256/Cheap-GPUs-Rendering-Strong-Passwords-Useless

EDIT: Urrghh, I hate how the language filter edits my URLs. -.- I had to shorten my first URL before I could link it.
User avatar
Sudah mati ini Keparat
 
Posts: 3605
Joined: Mon Jul 23, 2007 6:14 pm

Post » Thu Aug 09, 2012 6:02 am

Whelp, brb, deleting all my saved billing information on Amazon.
User avatar
Marquis T
 
Posts: 3425
Joined: Fri Aug 31, 2007 4:39 pm

Post » Thu Aug 09, 2012 9:25 am

I wouldn't blame the cloud or anything. People who get hacked are usually doing stupid things on the internet. Don't do stupid things and you won't get hacked. Never been hacked, don't see how a "random" person just gets hacked out of the blue.
They used his name and some information obtainable for about $0.17 per person you want the information on to reset an account over the phone, from which point they got enough information to reset another account over the phone, which gave them the ability to wipe his electronics since he uses Apple products connected to Apple's cloud services. Then they went after his email, which was easy at this point because they had his Apple email, and just requested a password reset be done. Next they went after his social media because they had his primary personal email account.

He didn't do anything stupid, he even had a decent security setup as far as passwords are concerned, but none of that mattered because of his use of the cloud and Apple products. His entire digital life fell to the oldest trick in the book: social engineering all because someone decided they didn't like him and wanted to screw with him for the lulz, much like how lulzsec screwed with these forums for the lulz a while back.

You obviously have no idea how technology works.
this is well established. He didn't even bother reading the source materials, otherwise he'd have realized how wrong he was.

http://me.veekun.com/blog/2011/12/04/%5Bcensored

You know that it's now possible to program http://it.slashdot.org/story/11/06/05/2028256/Cheap-GPUs-Rendering-Strong-Passwords-Useless
brute-forcing is worthless when dealing with online accounts, so passwords are fine. All of Mat's problems were related to social engineering (which can never be fixed), his use of the cloud, and his use of Apple's proprietary platforms.

dunno what the first link went on about, though, because the autocensor broked it.
User avatar
Sammi Jones
 
Posts: 3407
Joined: Thu Nov 23, 2006 7:59 am

Post » Thu Aug 09, 2012 2:05 am

And this is why I use 2-step verification for my Gmail. And don't touch Apple's products with a 10 foot pole. And use a 335-bit random password for my Gmail.
User avatar
Danny Warner
 
Posts: 3400
Joined: Fri Jun 01, 2007 3:26 am

Post » Thu Aug 09, 2012 4:56 am

And this is why I use 2-step verification for my Gmail. And don't touch Apple's products with a 10 foot pole. And use a 335-bit random password for my Gmail.
hear, hear! :foodndrink:

Had Mat just stayed away from apple products, though, none of the stuff that happened to him could have happened, even if his Gmail didn't have 2-step verification :tongue: (they wiped his Apple devices using Apple's cloud services and got into his gmail account because he used his apple mobileme email address as the password reset email address for his gmail)
User avatar
stephanie eastwood
 
Posts: 3526
Joined: Thu Jun 08, 2006 1:25 pm

Post » Thu Aug 09, 2012 2:50 am

And this is why I use 2-step verification for my Gmail. And don't touch Apple's products with a 10 foot pole. And use a 335-bit random password for my Gmail.
passwords were all reset in order to gain access to the accounts, and the first two were done over the phone
User avatar
lucile davignon
 
Posts: 3375
Joined: Thu Mar 22, 2007 10:40 pm

Post » Thu Aug 09, 2012 5:10 am

I still do not have a Twitter or Facebook account, or use any Apple products even though everyone I know does... It just seems creepy to willingly expose myself like that. I know the information age is awesome and high speed/bandwidth data transfer is handy... but that doesn't mean ALL data has to go on the internet.
User avatar
CArla HOlbert
 
Posts: 3342
Joined: Wed Feb 21, 2007 11:35 pm

Post » Thu Aug 09, 2012 6:02 am

passwords were all reset in order to gain access to the accounts, and the first two were done over the phone
1. Besides Amazon, all the accounts compromised before gmail were Apple-related

2. his gmail acount was only compromised because he had his apple mobileme account be the safety account for it

3. You can't request a password reset when two-factor authentication is enabled without the access code the verifier generates (because Google knows how to do security right)
User avatar
Sheeva
 
Posts: 3353
Joined: Sat Nov 11, 2006 2:46 am

Post » Thu Aug 09, 2012 4:42 am

passwords were all reset in order to gain access to the accounts, and the first two were done over the phone
I use two-step verification. Even if they could get Google to reset my password, they would also need my cellphone. And my Google reset password goes to my old University of Michigan e-mail account... which forwards to my Gmail. :P

Sure, if I get locked out of my Gmail I can't (easily) get back in, but it's better than not using two-step verification.
User avatar
Julie Ann
 
Posts: 3383
Joined: Thu Aug 23, 2007 5:17 am

Post » Thu Aug 09, 2012 8:26 am

I still do not have a Twitter or Facebook account, or use any Apple products even though everyone I know does... It just seems creepy to willingly expose myself like that. I know the information age is awesome and high speed/bandwidth data transfer is handy... but that doesn't mean ALL data has to go on the internet.

My Facebook and Twitter are 100% public, I share my location and data with every app on my iPhone. All of my pictures have GPS tags...Nothing bad has ever happened. I think it's pretty cool.

When I use the Nike+ Running app you can see where I'm running on a map and when. Doesn't bother me.
User avatar
mishionary
 
Posts: 3414
Joined: Tue Feb 20, 2007 6:19 am

Post » Thu Aug 09, 2012 4:24 am

My Facebook and Twitter are 100% public, I share my location and data with every app on my iPhone. All of my pictures have GPS tags...Nothing bad has ever happened. I think it's pretty cool.

When I use the Nike+ Running app you can see where I'm running on a map and when. Doesn't bother me.
So basically what you're saying is that if you ever got on the bad side of the wrong type of people they could steal your identity, erase your online presence, and rob your house while you're out and about without you having a chance of stopping them.

Good to know
User avatar
Eddie Howe
 
Posts: 3448
Joined: Sat Jun 30, 2007 6:06 am

Post » Thu Aug 09, 2012 1:24 am

So basically what you're saying is that if you ever got on the bad side of the wrong type of people they could steal your identity, erase your online presence, and rob your house while you're out and about without you having a chance of stopping them.

Good to know
Or get a [censored] load of pizzas.
User avatar
Pat RiMsey
 
Posts: 3306
Joined: Fri Oct 19, 2007 1:22 am

Post » Thu Aug 09, 2012 7:24 am

I like pizza.

Only thing better than pizza is free pizza.
User avatar
Heather beauchamp
 
Posts: 3456
Joined: Mon Aug 13, 2007 6:05 pm

Post » Thu Aug 09, 2012 1:48 am

Or get a [censored] load of pizzas.
Or come home and find people are throwing a party in his swimming pool :P
User avatar
Kathryn Medows
 
Posts: 3547
Joined: Sun Nov 19, 2006 12:10 pm

Post » Thu Aug 09, 2012 1:50 am

I like pizza.

Only thing better than pizza is free pizza.
What if they had no cheese at all, just sauce and anchovies.
User avatar
Genevieve
 
Posts: 3424
Joined: Sun Aug 13, 2006 4:22 pm

Post » Thu Aug 09, 2012 11:03 am

My Facebook and Twitter are 100% public, I share my location and data with every app on my iPhone. All of my pictures have GPS tags...Nothing bad has ever happened. I think it's pretty cool.

When I use the Nike+ Running app you can see where I'm running on a map and when. Doesn't bother me.

You're just asking to get robbed, partner.
User avatar
flora
 
Posts: 3479
Joined: Fri Jun 23, 2006 1:48 am

Post » Thu Aug 09, 2012 2:53 am

And this is why I use 2-step verification for my Gmail. And don't touch Apple's products with a 10 foot pole. And use a 335-bit random password for my Gmail.
Eeeeeh? I thought Gmail had a pretty short max length for passwords, like 16 or so. Maybe those sneaky bastards removed it.

My PW is only ~90 bit. :(
User avatar
Dagan Wilkin
 
Posts: 3352
Joined: Fri Apr 27, 2007 4:20 am

Post » Thu Aug 09, 2012 8:34 am

Eeeeeh? I thought Gmail had a pretty short max length for passwords, like 16 or so. Maybe those sneaky bastards removed it.

My PW is only ~90 bit. :(
Hotmail is the one with the 16 (or 15?) max password length. Gmail hasn't ever had it AFAIK. Gmail does have a 100 character password limit though (or at least Google Apps I know does)
User avatar
Nikki Lawrence
 
Posts: 3317
Joined: Sat Jul 01, 2006 2:27 am

Post » Thu Aug 09, 2012 8:18 am

Well that's scary. I'm glad I don't use apple's products, but this has motivated me to update the password on my gmail account and enable two-factor verification. Thank you, DEFRON.
User avatar
Zosia Cetnar
 
Posts: 3476
Joined: Thu Aug 03, 2006 6:35 am

Post » Thu Aug 09, 2012 12:04 am

What if they had no cheese at all, just sauce and anchovies.

It's free, right?

I'm a baller on a budget.
User avatar
Sabrina Schwarz
 
Posts: 3538
Joined: Fri Jul 14, 2006 10:02 am

Post » Thu Aug 09, 2012 11:59 am

It's free, right?

I'm a baller on a budget.
You've never heard of that prank before?

1. You order a bunch of pizza over the phone and say you'll pay with cash

2. You give them the address of the victim

3. Victim gets a bunch of pizza delivers and has to pay a huge bill.

Don't think it works in reality anymore, as the pizza shops have gotten wise, but you can still pull it off for small orders, probably
User avatar
Miranda Taylor
 
Posts: 3406
Joined: Sat Feb 24, 2007 3:39 pm

Next

Return to Othor Games