the icloud hack
play

The iCloud Hack CMSC 334 Prof Szajda 1 Social Engineering Many - PowerPoint PPT Presentation

The iCloud Hack CMSC 334 Prof Szajda 1 Social Engineering Many of the slide here deal with Social Engineering. Thanks for those slides go to: The late Dr. Yosef Sherif, unknown colleague at UW-Madison, Mathew Sullivan at Iowa State, Tanya


  1. The iCloud Hack CMSC 334 Prof Szajda 1

  2. Social Engineering Many of the slide here deal with Social Engineering. Thanks for those slides go to: The late Dr. Yosef Sherif, unknown colleague at UW-Madison, Mathew Sullivan at Iowa State, Tanya L. Crenshaw at U. Portland, various other colleagues and contributors 2

  3. iCloud Hack info Thanks to Nik Cubrilovic https://www.nikcub.com/posts/ notes-on-the-celebrity-data-theft/ 3

  4. The iCloud Hack: What happened? • Personal and private nude photos of celebs started appearing on online image boards and forums – First pics posted a week before the scam became public o Not public because images were being ransomed (only censored images distributed, and then only to entice folks to buy) o Once uncensored images published, scam blew up – Over 400 individual images and vids o Over a dozen celebs, at least 100 individuals had data compromised 4

  5. Apparently... � • This scam only scratches the surface – There are private communities and trading networks where data that is stolen remains private – Horizontally Organized o People carrying out specific tasks o Loosely organized o Communication via private email and IM 5

  6. The Goal � • Steal private media from phones that utilize cloud backup services integrated into iPhones, Android, and Windows phones • Accessing backup requires – User ID and Password OR – Authentication token 6

  7. Scammer Network Roles • Users who troll social networks looking for targets and collecting information – Utilize public record services and buy credit reports – Setup fake profiles – Friending target or friends of target – Extract info that helps answer secret questions 7

  8. Scammer Network Roles • Folks who use the gathered data to determine password of other authentication token. Methods: o (Most with online tutorials!) – RATS (Remote Access Tools) o Target tricked into installing via private message OR o Target receives email link or attachment that installs RAT OR o Friend of target installs RAT on phone or computer via physical access – Phishing: Target receives password reset or other tricks that cause target to enter password into a hacker- controlled site – Password reminder: after gaining control of email, have “reminder link” sent to access cloud storage – Password reset: answering birth and security question challenges (often easily broken with public info) 8

  9. Scammer Network Roles • Folks who use the authentication info to “rip” cloud- based backup services using pirates software specifically engineered to dump entire cloud backup set – Including messages and deleted photos 9

  10. Scammer Network Roles • Collectors: Organize stolen data info folders – Via Dropbox and Google Drive • Create preview images for each set of data, then email potential clients (i.e., their contacts) • Email addresses for collectors or for those willing to trade or sell are typically available by referral, often by someone offering a hacking or ripping service 10

  11. Disturbing... • Frequent source of new leads are folks who know someone they want to hack (e.g., friends of celebs) and who have stumbled onto a scammer network via search terms or forums • Contributor offers up Facebook profile along with enough info to figure out authentication tokens (possibly even offering to install RAT via physical access) • In return, contributor gets access to photos and harvested data 11

  12. FindMyPhone API Brute Force • An attack on the protocol that allows someone to find a lost iPhone, for example. • Given the success rate with the “social engineering” methods mentioned earlier, either this was not necessary, or possibly the hackers were not aware of it. 12

  13. iCloud a Popular Target • because Picture Roll backups are enabled by default and iPhone is a popular platform • Windows Phone backups are available on all devices, but not enabled by default 13

  14. Apple accounts particularly vulnerable • Because of recovery process – Broken into steps that fail at each point! – iCloud doesn’t reveal if an email is a valid iCloud address as part of recovery process o BUT they do indicate whether email is valid if one attempts to open a new account with the same email (thus allowing brute force) – Second step is date of birth o And step succeeds or fails solely on the basis of date of birth, so it can be guessed – Last step is the two security questions o Which can often be guessed based on harvested information 14

  15. Apple accounts particularly vulnerable • Solutions? • Apple should disable interface that indicates whether email is available for iCloud account • Recovery process should be one big step – Where all data is validated at once (so no way to know which step failed) – And user not given specific error message – Should also have rate limits and strict lockout on the recovery process on per-account basis o Ability to post to POST email address to link and getting validity response with little rate limiting is a serious bug 15

  16. OPSEC level of average scammer • Was not impressive • 98% of email addresses provided in forums as part of advertising or promotions are with the popular providers (gmail, outlook, yahoo) – None of these are TOR friendly • Users spoke of using VPNs when breaking into accounts, and suggesting which VPNs are best, fastest, and “most anonymous”. • It was incredibly easy to publicly identify those responsible 16

  17. Tracking one distributor • Posted a screenshot as part of an ad to sell 60 photos and vids for a single celeb, but didn’t black out his machine name or the machine names of the other computers on his local network – A user on one of reddit did a Google search and tracked down the company where the distributor worked. – Tracking each of the macine names lead to reddit account that posted a screen shot of the exact same explorer interface o Dude apparently liked to take screen shots of his own machine – Worse, the pics belonged to gymnast McKayla Maroney, who was a minor when the pics were taken o Thus the screen shot is an admission of possession of child pornography 17

  18. So, How to Stay Secure • Pick a better password • Set security answers to be long random strings • Enable two-factor authentication • Ring-fence email – Two different email addresses, one for public consumption, another for private accounts • If you are a celeb, get a second phone that uses an alias 18

  19. Apple ʼ s Official Statement 19

  20. Social Engineering 20

  21. Social Engineering: Definition � • Social Engineering: “the practice of obtaining confidential information by manipulation of legitimate users.” (from Wikipedia.com) • Attackers “trick” employees into revealing sensitive information, usually to gain access to a computer system: user-ID, password, IP address, etc. 21

  22. Social Engineering: Definition � • A Social Engineer is basically a flavor of “Con- Man” (“Con-Person?) • Historically, Con-Men have been highly successful at convincing victims to give them valuable items (money, jewelry, etc). • Social Engineers employ similar methods aided by modern technology to obtain valuable data from system users. 22

  23. Social Engineering: Definition � • Con-Men and social engineers see their attacks as an art form or a social trade. – The pride themselves on their ability to manipulate a person’s natural tendency to trust others – They are highly skilled and use very effective psychological methods – Some work for personal edification; other work for profit 23

  24. Social Engineering ¨ The end user is usually the weakest link of a system ¤ People are often lazy, ignorant to security, or simply gullible ¨ Social engineering is a journey into social psychology! ¤ Yes I know, that probably doesn’t sound very fun ¤ Well guess what… it is, so deal with it!

  25. But First: Some Examples 25

  26. Case Scenario: Meet Angry Cow � • Angry Cow is a Computer Science student at UW- Madison • Angry Cow just got an eviction notice! 26

  27. Simple Public Information is Found • Angry Cow lives at the Regent • The Regent’s website indicates that it is owned by Steve Brown Properties • Angry Cow wants to “fix” Steve Brown’s record keeping spreadsheet to show that rent has been paid 27

  28. Finding A Way In... • Facebook is Angry Cow’s first weapon of choice because it is an unofficial source of information • Poor controls over data sharing • Lots of important information there that might not seem important, but could be his first step in… • Go to Facebook and search: “Steve Brown Apartments” to find an appropriate unknowing accomplice 28

  29. 29

  30. Let ʼ s See -- Danielle Treu • Born July 24, 1988 • Enjoys playing in the rain, drinking coffee, and spending money • Works at Subway and as a Resident Assistant for Steve Brown Apartments 30

  31. Let ʼ s See -- David Klabanoff • Born April 21, 1979 • Likes Star Wars and The Muppet Movie • Is a Concierge for Steve Brown Apartments 31

  32. Let ʼ s See -- Andrew Baldinger (who made these slides?) • Born March 30, 1986 • Likes kayaking, exploring, and getting lost • Lives at the Regent • Works as a Technology Support Specialist for Steve Brown Apartments 32

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend