Apple, Amazon Close Holes that Allowed Honan Hack

Earlier this week, Wired reporter Mat Honan reported that his iCloud account had been compromised. The hack resulted in his MacBook, iPad and iPhone being remote wiped, his Google account deleted, and his Twitter account hijacked. The hacker told Honan that they had done it all just to get their hands on his three-letter Twitter handle (@mat), and that they rest (deleting his Google account, wiping his personal devices), had just been to ensure he couldn't take the Twitter account back.

Honan explained that the person (or persons) responsible for the attack had been able to achieve all of this by exploiting weaknesses in both Amazon and Apple's security systems. Amazon is guilty of eventually allowing the hacker to see the last four digits of Honan's credit card number, while Apple apparently issues temporary passwords to users that are able to provide a billing address and the last four digits of the credit card on file.

To get to Amazon, the hacker used WHOIS on Honan's domain to get his billing address, and then phoned Amazon looking to add a new credit card to his account (information required to do this: name on the account, e-mail address, and billing address). With that done, they called back and said they couldn't get access to the account and need to add a new email address to their profile. After providing Amazon support with name, address, email, and the newly-added credit card details, the new email was added. After that, they logged on to Amazon and sent a password reset to the new e-mail account. Once inside the Amazon account, they were able to see those all-important last four digits of the credit card. A phone call to Apple followed and, after providing the billing address and the last four digits of Honan's credit card number, the hacker was granted access to Honan's iCloud account. Because Honan's AppleID was linked to his Gmail account, the hacker was able to change that password, and gain access to his Twitter account before deleting his Google account altogether.

Following the high-profile attack, both Amazon and Apple are now working to fix these weaknesses in their systems that leave their users vulnerable to attack. Amazon yesterday said that it had taken care of the exploit in question.

"We have investigated the reported exploit, and can confirm that the exploit has been closed as of yesterday afternoon," an Amazon rep told CNET.
As for Apple, the company originally told Honan that his was a case of both the customer's data being compromised by a person who had acquired personal information and internal Apple policies not being followed completely. However, Honan said in his Wired post that he was able to verify the hackers' access technique by performing it on a different account. Not only that, but AppleCare staff told him twice that billing address and last-four-digits were enough to verify someone's identity. 

According to the Guardian, Amazon has stopped allowing customers to change account information over the phone and Apple has stopped issuing passwords over the phone. It's not clear if either company has plans to further alter their security systems to protect against attacks such as the one against Mat Honan. Still, it's worth mentioning that the attack would not have been possible had Honan had Google's two-step verification set up. What's more, the hackers would have had a much harder time had he not used the same username across all of his email accounts (mhonan@). 

Follow @JaneMcEntegart on Twitter.       

 

Contact Us for News Tips, Corrections and Feedback

Create a new thread in the US News comments forum about this subject
This thread is closed for comments
20 comments
    Your comment
    Top Comments
  • aftcomet
    As terrible as this is, it's quite ingenious.
    17
  • Anonymous
    Just goes to show as another example of how cloud systems are not proving themselves as safe.
    13
  • Other Comments
  • aftcomet
    As terrible as this is, it's quite ingenious.
    17
  • jhansonxi
    Most people learn the basics of this hack when they are kids - playing one parent against the other. Quite an interesting logical extension of it.
    4
  • internetlad
    fantastic use of social engineering. They knew how to manipulate the weak links (humans) to get the info they needed.

    It's a shame when a good portion of the scams and malicious software installations we see are directly related to the user clicking on something stupid because it tells them they have an infection, etc.
    2