Apple, Amazon Close Holes that Allowed Honan Hack

Earlier this week, Wired reporter Mat Honan reported that his iCloud account had been compromised. The hack resulted in his MacBook, iPad and iPhone being remote wiped, his Google account deleted, and his Twitter account hijacked. The hacker told Honan that they had done it all just to get their hands on his three-letter Twitter handle (@mat), and that they rest (deleting his Google account, wiping his personal devices), had just been to ensure he couldn't take the Twitter account back.

Honan explained that the person (or persons) responsible for the attack had been able to achieve all of this by exploiting weaknesses in both Amazon and Apple's security systems. Amazon is guilty of eventually allowing the hacker to see the last four digits of Honan's credit card number, while Apple apparently issues temporary passwords to users that are able to provide a billing address and the last four digits of the credit card on file.

To get to Amazon, the hacker used WHOIS on Honan's domain to get his billing address, and then phoned Amazon looking to add a new credit card to his account (information required to do this: name on the account, e-mail address, and billing address). With that done, they called back and said they couldn't get access to the account and need to add a new email address to their profile. After providing Amazon support with name, address, email, and the newly-added credit card details, the new email was added. After that, they logged on to Amazon and sent a password reset to the new e-mail account. Once inside the Amazon account, they were able to see those all-important last four digits of the credit card. A phone call to Apple followed and, after providing the billing address and the last four digits of Honan's credit card number, the hacker was granted access to Honan's iCloud account. Because Honan's AppleID was linked to his Gmail account, the hacker was able to change that password, and gain access to his Twitter account before deleting his Google account altogether.

Following the high-profile attack, both Amazon and Apple are now working to fix these weaknesses in their systems that leave their users vulnerable to attack. Amazon yesterday said that it had taken care of the exploit in question.

"We have investigated the reported exploit, and can confirm that the exploit has been closed as of yesterday afternoon," an Amazon rep told CNET.
As for Apple, the company originally told Honan that his was a case of both the customer's data being compromised by a person who had acquired personal information and internal Apple policies not being followed completely. However, Honan said in his Wired post that he was able to verify the hackers' access technique by performing it on a different account. Not only that, but AppleCare staff told him twice that billing address and last-four-digits were enough to verify someone's identity. 

According to the Guardian, Amazon has stopped allowing customers to change account information over the phone and Apple has stopped issuing passwords over the phone. It's not clear if either company has plans to further alter their security systems to protect against attacks such as the one against Mat Honan. Still, it's worth mentioning that the attack would not have been possible had Honan had Google's two-step verification set up. What's more, the hackers would have had a much harder time had he not used the same username across all of his email accounts (mhonan@). 

Follow @JaneMcEntegart on Twitter.       

Contact Us for News Tips, Corrections and Feedback

  • aftcomet
    As terrible as this is, it's quite ingenious.
    Reply
  • jhansonxi
    Most people learn the basics of this hack when they are kids - playing one parent against the other. Quite an interesting logical extension of it.
    Reply
  • internetlad
    fantastic use of social engineering. They knew how to manipulate the weak links (humans) to get the info they needed.

    It's a shame when a good portion of the scams and malicious software installations we see are directly related to the user clicking on something stupid because it tells them they have an infection, etc.
    Reply
  • Just goes to show as another example of how cloud systems are not proving themselves as safe.
    Reply
  • ddpruitt
    Has it occurred to anyone that Apple stores passwords as plain-text? I think they have bigger issues than just giving out passwords over the phone, they need a top down security audit.
    Reply
  • teh_chem
    ddpruittHas it occurred to anyone that Apple stores passwords as plain-text? I think they have bigger issues than just giving out passwords over the phone, they need a top down security audit.It was discovered that apple stores passwords in plain text?
    Reply
  • koga73
    I would think that Apple uses hashed passwords and probably just reset his pass to something new temporarily... However if this is the case then how did the hackers gain access to his gmail account unless Apple read his original plain text password to the hackers?

    "Because Honan's AppleID was linked to his Gmail account, the hacker was able to change that password"
    Reply
  • hax0red
    We called this social engineering back on AOL in late 90's early 2,000's. We used to do the same, 3 letters(shortest AOL screen name you could have without an exploit) considered "elite" lol. Internal AOL accounts were the biggest prize as it gave you the power of god in the AOL chats....so sad. lol.

    They eventually went to RSA secureid which stopped the internal AOL account pursuit short of having them sub7'd in which you could log their key presses @ login.
    Reply
  • lathe26
    The last 4 digits of your credit card have NEVER been secure. Almost every account I have where I pay a business via credit card displays these. Many receipts emailed to me have the last 4 digits. All of my paper receipts have the last 4 digits. Seriously, what were they thinking?
    Reply
  • I think the term manipulator is more appropriate than hacker. There was no hacking involved.
    Reply