Jump to content

Labour Day Weekend Jargina Nude Fotos Leak Ila Jargindi...


Recommended Posts

Posted

As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible in the first place. But one step in the hackers’ sext-stealing playbook has been ignored—a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by pervy criminals themselves.

 

On the web forum Anon-IB, one of the most popular anonymous image boards for posting stolen nude selfies, hackers openly discuss using a piece of software called EPPB or Elcomsoft Phone Password Breaker to download their victims’ data from iCloud backups. That software is sold by Moscow-based forensics firm Elcomsoft and intended for government agency customers. In combination with iCloud credentials obtained with iBrute, the password-cracking software for iCloud released on Github over the weekend, EPPB lets anyone impersonate a victim’s iPhone and download its full backup rather than the more limited data accessible on iCloud.com. And as of Tuesday, it was still being used to steal revealing photos and post them on Anon-IB’s forum.

 

 

If a hacker can obtain a user’s iCloud username and password with iBrute, he or she can log in to the victim’s iCloud.com account to steal photos. But if attackers instead impersonate the user’s device with Elcomsoft’s tool, the desktop application allows them to download the entire iPhone or iPad backup as a single folder, says Jonathan Zdziarski, a forensics consult and security researcher. That gives the intruders access to far more data, he says, including videos, application data, contacts, and text messages.

 

On Tuesday afternoon, Apple issued a statement calling the security debacle a “very targeted attack on user names, passwords and security questions.” It added that “none of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud® or Find my iPhone.”

Posted

so weak passwords reason aa ?

 

 

main reason:

 

Apple allowed to accept 1000's of incorrect passwords, usual ga 5 attempts ki account lock aipovali...  iBruteForce attack.

 

Second Reason:

weak passwords, and easy answer to the security questions

Posted

main reason:

 

Apple allowed to accept 1000's of incorrect passwords, usual ga 5 attempts ki account lock aipovali...  iBruteForce attack.

 

Second Reason:

weak passwords, and easy answer to the security questions

apple lo desi consultants work chesthaara ?

Posted

apple lo desi consultants work chesthaara ?

 

networking side chala mandi frends working full time in Apple..

 

Desi consultants kuda chestaru ....

×
×
  • Create New...