Phone Password Breaker behind the iCloud leaks?

While Apple Lossless Audio CODEC (ALAC), has refused to blame his service iCloud on the leak of celebrity nude photos last week, Wired reports that the attackers used a που κυκλοφορεί στην αγορά για την backups of iCloud accounts.Elcomsoft Phone Password Breaker Professional iCloud

The author of the article, Andy Greenberg, has spent a lot of time researching a forum (Anon-IB) about the techniques hackers use to obtain σε προσωπικές φωτογραφίες. Ένα τέτοιο εργαλείο είναι η εφαρμογή της Elcomsoft Phone Password Breaker (EPPB). Η Elcomsoft αναφέρει για το λογισμικό της ότι είναι “ιδανική λύση για τις αρχές επιβολής του νόμου και τις υπηρεσίες πληροφοριών,” αλλά φαίνεται να είναι πολύ δημοφιλές στις τάξεις των hackers που προσπαθούν να κλέψουν δεδομένα άλλων. Ενώ οι επιτιθέμενοι θα πρέπει ακόμα να αποκτήσουν τα στοιχεία του λογαριασμού μέσω άλλων μεθόδων, η εφαρμογή EPPB διαφημίζει ένα χαρακτηριστικό πρόσβασης με παράκαμψη του κωδικού πρόσβασης χρησιμοποιώντας ένα διακριτικό ς (authentication token) από ένα συγχρονισμένο σύστημα PC ή Mac.
The technique is not new.

There are several assumptions about the technique hackers used. Naturally, the technique is known only by the one who used it and perhaps the research that will be carried out by Apple technicians and the authorities that have undertaken to clarify the case. We may never know it, as Apple avoids such announcements. We usually learn the vulnerabilities that allowed a violation by the attackers themselves and not by the company.

In this attack, however, the hacker or hackers have preferred to keep their mouth closed.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).