RBSC

Collapse

Announcement

Collapse
No announcement yet.

Apple’s Two-Step iCloud Authentication Deemed Unsecure By Th

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Apple’s Two-Step iCloud Authentication Deemed Unsecure By Th

    Apple’s Two-Step iCloud Authentication Deemed Unsecure By Third-Party Security Firm

    May 31, 2013

    Image Credit: Apple Inc.
    Michael Harper for redOrbit.com – Your Universe Online
    Apple recently rolled out two-step authentication check for iCloud to protect users from having their account info changed without an additional, one-time password. They were a tad late to the game, however, as companies like Dropbox, Google, Facebook, Twitter and others have already implemented this additional security step for their users.
    Now that security researchers have had enough time to scour Apple’s methods for this two-step authentication and give it a test drive, it’s been found to be less secure than the others. ElcomSoft, a Russian security software company, claimed in a blog yesterday that Apple’s security measures only protect users from having account info like passwords and billing address from being accessed or changed. If this information is already compromised, or if a hacker is able to gain physical access to your iPhone, however, this two-step measure could be essentially worthless. ElcomSoft even went so far to say that Apple’s two-step authentication process, as it currently exists, is not a “finished product.”
    Vladimir Katalov with ElcomSoft put Apple’s security measures to the test and found it lacking. To begin, Katalov takes issue with the optional nature of this two-step authentication, especially considering the incredibly important information stored in iCloud. As Mat Honan discovered last year, an iCloud hack could give cyber thieves access to nearly all of your digital life.
    Going further, Katalov found that even when a user chooses to turn on two-step authentication, this doesn’t protect iOS backups or iCloud data, like calendars, mail or photos.
    “In its current implementation, Apple’s two-factor authentication does not prevent anyone from restoring an iOS backup onto a new (not trusted) device,” writes Katalov.
    “In addition, and this is much more of an issue, Apple’s implementation does not apply to iCloud backups, allowing anyone and everyone knowing the user’s Apple ID and password to download and access information stored in the iCloud.”
    This is frighteningly easy to verify, unfortunately. Any user can log into the iCloud website and see their data, and if the login credentials have been compromised, this means any hacker can have access to the same information. During their tests, ElcomSoft was able to gain access to iCloud data without ever running into any two-step authentication barriers. Even when this feature is turned on, Apple sends the unlock PIN to the iPhone’s lock screen rather than sending it through an iMessage or text message. This means any hacker with physical access to the phone only needs the login credentials to have complete control of an iCloud account.
    “In ElcomSoft’s opinion, this is just not the right way to do this from a security point of view. iCloud has been exploited in the past and will be exploited in the future,” says ElcomSoft.
    To be fair, any Apple ID or iCloud account is as secure as its password. It’s also true that one must trade some convenience to gain some security. Any two-step measure is more complicated by its very nature.
    The most secure way to lock down an iCloud account is to simply change passwords every few weeks or so, using strong and secure passwords each time. Yet as this is likely a little too inconvenient for most (and very hard to remember), measures like two-step are a helpful way to keep users protected. It seems Apple’s method, however, isn’t doing much to protect users at all.


    Source: Michael Harper for redOrbit.com – Your Universe Online

  • #2
    Sophisticated Hackers Can Crack Even The Most Secure Passwords

    May 29, 2013


    Image Credit: Thinkstock.com
    Michael Harper for redOrbit.com – Your Universe Online
    In the wake of last year’s password dumps and this year’s Twitter hacks, many have been paying extra attention to their passwords. The most common advice doled out is to use separate passwords for each website and service. Additionally, these passwords are supposed to be “strong,” meaning they combine letters, numbers and symbols and stay away from dictionary words.
    Yet as the old adage goes, a fence can only keep out the good people. Criminals or trespassers who want to crack into your digital figurative backyard will always find a way, and according to a challenge posed by Ars Technica, to three hackers, even the strongest passwords – such as “qeadzcwrsfxv1331” – can be hacked if one has the proper amount of computing power behind them.
    As it is with any numerical sequence, like a telephone number, guessing it requires a certain amount of trial and error. While it could take a human many years to correctly guess a long random number, computers were built to mindlessly hash through these sort of computations at a dizzying speed, and what took a person years to calculate could take a modern machine but seconds to solve. To put it plainly, password crackers set their computers to churn through the seemingly infinite number guesses until they reach the right answer. Depending on the hardware used, this could take minutes or months, but with enough tries and enough experience, password crackers are able to unlock a frightening number of even the most complex passwords.
    To put this to the test, Ars Technica recruited three “cracking experts,” including a security consultant, a developer of a popular password cracking software, and a member of the Anonymous hacktivist collective. This crew was given a list of 16,449 passwords which were hashed using the MD5 cryptographic hash function. When websites and services store passwords, they run them through a hashing function which turns plaintext passwords like “password” into something that looks like “5f4dcc3b5aa765d61d8327deb882cf99.” The MD5 cryptographic hash has been found to be something less than rock solid and easily cracked with relatively basic hardware.
    The recruited hackers set about cracking the list of hashed passwords and, according to the report’s author Dan Godin, “To put it mildly, they didn’t disappoint.”
    The least successful of the hackers, an Anonymous hacker who goes by the moniker “radix” was able to crack 62 percent of the list of hashed passwords in one hour using a machine with a single AMD Radeon 7970 GPU. And, as Godin points out, he was also quite distracted as the Ars reporters “peppered” him with questions about his process while he worked. The most successful of the three, Jeremy Gosney with Stricture Consulting Group, used the same GPU as radix and cracked 90 percent of the password list in about 20 hours.
    These hackers use software which can not only use brute-force attacks against passwords but also combine random words and dictionary-like compilations which have been previously cracked. Gosney explained his process in an email to Ars Technica, saying that he starts with a brute-force crack, then moves on to his more nuanced dictionary cracks.
    “And because I can brute-force this really quickly, I have all of my wordlists filtered to only include words that are at least six (characters) long. This helps to save disk space and also speeds up wordlist-based attacks,” explained Gosney.
    “Our goal is to find the most (plain text passwords) in the least amount of time, so we want to find as much low-hanging fruit as possible first.”
    The general public has no control over which hashing process websites use and therefore are at the mercy of an algorithm which they may know nothing about. It’s been recommended to use a password generator and storage service like 1Password to create the most secure passwords for each site and service. One strong and complex password could then be used to access the other passwords stored with the service. While hackers will always try to find ways to crack even the most secure passwords, this appears to be one of the best options currently out there.


    Source: Michael Harper for redOrbit.com – Your Universe Online

    Comment


    • #3
      computer security concerns are real. As I said earlier, it is staggering the amount companies are spending on this recently but no matter how good they get the old insider technique where you have a one person on the inside passing basic info, things like the lotto scams are still not going away.

      We should all consider ourselves hacked or been the target of hacking.
      • Don't let negative things break you, instead let it be your strength, your reason for growth. Life is for living and I won't spend my life feeling cheated and downtrodden.

      Comment

      Working...
      X