Earlier this week, Wired reporter Mat Honan reported that his iCloud account had been compromised. The hack resulted in his MacBook, iPad and iPhone being remote wiped, his Google account deleted, and his Twitter account hijacked. The hacker told Honan that they had done it all just to get their hands on his three-letter Twitter handle (@mat), and that they rest (deleting his Google account, wiping his personal devices), had just been to ensure he couldn't take the Twitter account back.
Honan explained that the person (or persons) responsible for the attack had been able to achieve all of this by exploiting weaknesses in both Amazon and Apple's security systems. Amazon is guilty of eventually allowing the hacker to see the last four digits of Honan's credit card number, while Apple apparently issues temporary passwords to users that are able to provide a billing address and the last four digits of the credit card on file.
To get to Amazon, the hacker used WHOIS on Honan's domain to get his billing address, and then phoned Amazon looking to add a new credit card to his account (information required to do this: name on the account, e-mail address, and billing address). With that done, they called back and said they couldn't get access to the account and need to add a new email address to their profile. After providing Amazon support with name, address, email, and the newly-added credit card details, the new email was added. After that, they logged on to Amazon and sent a password reset to the new e-mail account. Once inside the Amazon account, they were able to see those all-important last four digits of the credit card. A phone call to Apple followed and, after providing the billing address and the last four digits of Honan's credit card number, the hacker was granted access to Honan's iCloud account. Because Honan's AppleID was linked to his Gmail account, the hacker was able to change that password, and gain access to his Twitter account before deleting his Google account altogether.
Following the high-profile attack, both Amazon and Apple are now working to fix these weaknesses in their systems that leave their users vulnerable to attack. Amazon yesterday said that it had taken care of the exploit in question.
"We have investigated the reported exploit, and can confirm that the exploit has been closed as of yesterday afternoon," an Amazon rep told CNET.
As for Apple, the company originally told Honan that his was a case of both the customer's data being compromised by a person who had acquired personal information and internal Apple policies not being followed completely. However, Honan said in his Wired post that he was able to verify the hackers' access technique by performing it on a different account. Not only that, but AppleCare staff told him twice that billing address and last-four-digits were enough to verify someone's identity.
According to the Guardian, Amazon has stopped allowing customers to change account information over the phone and Apple has stopped issuing passwords over the phone. It's not clear if either company has plans to further alter their security systems to protect against attacks such as the one against Mat Honan. Still, it's worth mentioning that the attack would not have been possible had Honan had Google's two-step verification set up. What's more, the hackers would have had a much harder time had he not used the same username across all of his email accounts (mhonan@).
Follow @JaneMcEntegart on Twitter.
It's a shame when a good portion of the scams and malicious software installations we see are directly related to the user clicking on something stupid because it tells them they have an infection, etc.
"Because Honan's AppleID was linked to his Gmail account, the hacker was able to change that password"
They eventually went to RSA secureid which stopped the internal AOL account pursuit short of having them sub7'd in which you could log their key presses @ login.