What Hackers Find Out About You When They Get Into iCloud Is Terrifying

Publish date: 2024-07-01
2014-09-11T14:03:00Z

Most of the headlines generated by the hackers who broke into the Apple iCloud accounts of 101 celebrities have revolved around the trove of naked photos they found stored on people's iPhone backup facility.

But this story published late yesterday by Ars Technica is essential reading for anyone who cares about the privacy and security of iPhone users.

Basically, author Sean Gallagher bought two pieces of commercially available software that the iCloud hackers are thought to have used: Elcomsoft's  iOS Forensic Toolkit (EIFT) and Elcomsoft Phone Password Breaker (EPPB). He then spent some time trying to hack his way into the phones of various family members.

What Gallagher found ought to terrify anyone who either doesn't understand how iCloud works, or who hasn't activated all the security features of iCloud (which is to say, a huge portion of all iCloud users).

Kate Upton should probably wipe clean her iCloud account, ditch it, and throw her old phone away. AP

Once you have hacked into an iCloud account, the Elcomsoft tools let you download a full backup of the account's owner. You basically get complete access to everything on their phone. The Ars Technica report confirms an earlier one we covered noting that hackers probably now have copies of Kate Upton's entire phone.

Worse, you get access to all the stuff that used to be on the phone but the user thought was deleted. That confirms an earlier post on Business Insider explaining that celebs probably were not storing naked selfies on their phones or in iCloud — because they mistakenly believed they were deleted.

Here is what he found on the iCloud backups he hacked:

A diagram from an Elcomsoft video tutorial on hacking into an iPhone. "Getting evidence is easy with the Elcomsoft iOS Forensic Toolkit," the company says. Elcomsoft

What happens is that the Elcomsoft package lets hackers get a virtually complete copy of the users' phone in addition to a virtually complete copy of all the material Apple uses to backup and restore the phone — which means a ton of data and media that might have been "deleted" by the user but was in fact being held for backup/restore purposes, just in case.

The material then lets those same hackers stalk their targets in real time, Gallagher says:

Even creepier, the iCloud access also gives the attacker the ability to stalk the victim in real-time by using the Find My iPhone feature. If the phone is turned on and Find My iPhone was configured, the attacker can use the feature just as the owner would (of course, odds are that it’s on the owner’s person). We were able to identify the location of family members in this way as soon as the target phone was turned on.

This would imply that anyone who believes their iCloud has been hacked ought to delete their backups, create a new password, and gain access to it again. Doing so would not render iCloud less vulnerable to fture Elcomsoft attacks, but it would force the hacker to start from the beginning again.

ncG1vNJzZmivp6x7o8HSoqWeq6Oeu7S1w56pZ5ufony4tMCtZKGZk6Cys7%2BMoJytZZanvK55yJyjqK2UYn9xfZNmcA%3D%3D