Apple iCloud close leak that was vulnerable to brute force attacks’




A developer who lurks developed called Pr0x13 has a tool that tries a brute force attack to determine iCloud passwords. The tool would work despite Apple this security is built. Since then the problem would have been solved.

Apple itself has nothing brought out about the vulnerability, but the tool of Pr0x13 would already no longer work suggesting that the company has resolved the problems. On his Github page has the developer code online put initially that security in iCloud to go would be to circumvent against brute force attacks. The author calls the bug that made possible “painfully obvious”.

It is unclear whether in the short time that the tool, which bears the name IDICT has worked data from iCloud users are captured. On social networking sites like Twitter and Reddit said IDICT functions as described, which makes it likely that the data has been stolen. Now being reported so that the tool no longer works properly.

To work with IDICT users had to know what email address it was part of the iCloud account hacking, as reports Business Insider. The tool then tries a list of 500 common passwords. For that reason, not every account vulnerable if the password used not on the list can IDICT not break. However, the tool could easily be equipped with a long list of possible passwords.

There had previously been criticized by Apple because of the sensitivity of iCloud for brute force attacks. The vulnerability meant that users unlimited passwords could recommend for iCloud. The bug came out when it was found that there are photos from iCloud accounts of American actresses and other celebrities were stolen . Apple then took measures, but this could apparently be circumvented.


In: Technology & Gadgets Asked By: [68 Blue Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »