{"id":5895,"date":"2014-09-02T15:46:05","date_gmt":"2014-09-02T19:46:05","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=5895"},"modified":"2020-02-26T10:55:09","modified_gmt":"2020-02-26T15:55:09","slug":"celebrity-photos-leaked","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/celebrity-photos-leaked\/5895\/","title":{"rendered":"How to protect yourself from cloud service leaks"},"content":{"rendered":"<p>The last weekend of this summer was marked by an internet-wide newsbreak: anonymous hackers (perhaps a single man) somehow obtained explicit photos of various Hollywood celebrities, including many A-listers, like Jennifer Lawrence, and publicized this material on the Internet. Such leaks are not new, however, this one was on a massive scale. From the very beginning there was an assumption that perhaps some photos were stolen directly from celebrities\u2019 accounts in the Apple\u2019s iCloud. Is this possible? If so, what can be done to avoid the theft?<\/p>\n<h3>Possible leak scenario<\/h3>\n<p>At this time, there is no hard evidence in this case. Apple and the FBI are currently investigating and we look forward to reading the results. Some facts suggest that unauthorized access to victims\u2019 accounts was possible due to a combination of factors. First, a small flaw in the iCloud platform implementation allowed an unlimited amount of account password tries. Normally, a web service locks the account when someone unsuccessfully tries to log in more than 3-5 times. While that was the case for the normal web interface of iCloud, the Find My iPhone interface was lacking this limitation. This defect enabled hypothetical hackers to implement \u201cbruteforcing\u201d, i.e. systematically trying multiple popular passwords until they give up or the access is granted. To bruteforce iCloud accounts, hackers may have used an open source application, which emerged on the popular programmers\u2019 site, GitHub, just a few days before the incident.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06015607\/bruteforce.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-4416\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06015607\/bruteforce.png\" alt=\"bruteforce\" width=\"443\" height=\"307\"><\/a><\/p>\n<p>Second, many celebrities probably ignored <a href=\"https:\/\/www.kaspersky.com\/blog\/21st-century-passwords\/\" target=\"_blank\" rel=\"noopener nofollow\">strong password policies<\/a> and chose very basic passwords. Hackers may have only tried the top-500 popular passwords for bruteforcing and could have still achieved impressive results.<\/p>\n<p>According to some reports, the flaw was promptly fixed, and by Monday it was impossible to bruteforce iCloud accounts anymore. However, there are no guarantees that other vulnerabilities do not exist.<\/p>\n<p>Furthermore, this is not the first occasion when criminals have attacked Apple users utilizing iCloud and Find My iPhone. This summer, some countries experienced a wave of cyber-extortion incidents were <a href=\"https:\/\/www.kaspersky.com\/blog\/ransomware_targets_ios_osx\/\" target=\"_blank\" rel=\"noopener nofollow\">victims suddenly found their iPhones\/iPads locked<\/a> using the anti-theft functionality of Find My iPhone. The lock screen was displaying a message demanding a ransom to regain control of the device.<\/p>\n<h3>Protecting yourself and your data<\/h3>\n<p>This alleged incident proves that our privacy is increasingly fragile nowadays, for celebs and ordinary people alike. Although cloud-based file storage services have long been popular among Internet users, the indisputable convenience of such services is at least partly offset by some significant risks.<br>\n<\/p><blockquote class=\"twitter-pullquote\"><p>7 tips from #Kaspersky experts on how to avoid #iCloud photo #leaks<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FrMY8&amp;text=7+tips+from+%23Kaspersky+experts+on+how+to+avoid+%23iCloud+photo+%23leaks\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote><br>\nFor example, many users store scans of their passports and other sensitive documents (or sensitive photos) in the cloud \u2013 though sometimes vulnerabilities in the service jeopardize the security of that personal data. When it comes to cloud security, the security of the endpoint is often overlooked. The device itself could also become the source of a leak if it is compromised by malware with spying capabilities that can sends files and credentials from the cloud directly into the hands of cybercriminals.\n<p>To avoid possible issues with private data leaks via computers, mobile devices or cloud services, Christian Funk, Senior Security Researcher at Kaspersky Lab, recommends the following measures:<\/p>\n<ol>\n<li>Use strong passwords, unique to each account.<\/li>\n<li>Use endpoint security solutions to protect your devices, because every device is a gateway to your cloud storage.<\/li>\n<li>Enable and use two-factor authentication services whenever available.<br>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/APLl2fPAH2g?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/li>\n<li>Sort out which information should or should not be stored in the cloud. Your most sensitive information \u2013 whether relating to your personal or professional life \u2013 should never be trusted to the cloud.<\/li>\n<li>It\u2019s easy for a mobile device to be lost or stolen, so make sure the device itself has no sensitive data stored on it. If this is impossible, make sure there is appropriate encryption in place.<\/li>\n<li>If you\u2019re about to store highly sensitive information (including photos and videos), double check that your device doesn\u2019t automatically upload data into the cloud.<\/li>\n<li>Before sharing your personal data or allowing someone to take a picture of you, make sure that the other device is sufficiently secure to keep your private data safe from inadvertent exposure.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Everybody is blaming <a href=\"https:\/\/twitter.com\/hashtag\/Apple?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Apple<\/a> for celebrities pictures <a href=\"https:\/\/twitter.com\/hashtag\/leak?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#leak<\/a>. This option set to off would help to prevent it. <a href=\"http:\/\/t.co\/NiYNn7EBFo\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/NiYNn7EBFo<\/a><\/p>\n<p>\u2014 Dmitry Bestuzhev (@dimitribest) <a href=\"https:\/\/twitter.com\/dimitribest\/status\/506820178320322560?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">September 2, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Don\u2019t want your private photos or credit card posted somewhere on the web? You should rethink your approach to cloud services then. <\/p>\n","protected":false},"author":214,"featured_media":5896,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[14,807,808,78,806,43],"class_list":{"0":"post-5895","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-apple","9":"tag-celebrities","10":"tag-cloud-services","11":"tag-hackers","12":"tag-icloud","13":"tag-privacy"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/celebrity-photos-leaked\/5895\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/celebrity-photos-leaked\/4033\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/celebrity-photos-leaked\/3936\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/celebrity-photos-leaked\/4414\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/celebrity-photos-leaked\/4675\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/celebrity-photos-leaked\/5074\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/celebrity-photos-leaked\/4680\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/celebrity-photos-leaked\/5074\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/celebrity-photos-leaked\/5895\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/celebrity-photos-leaked\/5895\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/apple\/","name":"Apple"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5895"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5895\/revisions"}],"predecessor-version":[{"id":33300,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5895\/revisions\/33300"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/5896"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}