I DON’T KNOW IF THIS IS A CHICKEN LITTLE THE SKY IF FALLING OR NOT.
Article came out of Techconnect email I get daily.
Lucian Constantin By Lucian Constantin
Romania Correspondent, IDG News Service |
Mar 22, 2017 9:43 AM PT
A group of hackers is threatening to wipe data from millions of Apple devices in two weeks if the company doesn’t pay them US$150,000.
The group, which calls itself Turkish Crime Family, claims to have login credentials for more than 627 million icloud.com, me.com and mac.com email addresses. These are email domains that Apple has allowed for users creating iCloud accounts over the years.
Even though the Turkish Crime Family hasn’t been in the media spotlight before, its members claim that they’ve been involved in selling stolen online databases in private circles for the past few years.
The group said via email that it has had a database of about 519 million iCloud credentials for some time, but did not attempt to sell it until now. The interest for such accounts on the black market has been low due to security measures Apple has put in place in recent years, it said.
Since announcing its plan to wipe devices associated with iCloud accounts, the group claimed that other hackers have stepped forward and shared additional account credentials with them, putting the current number it holds at over 627 million.
According to the hackers, over 220 million of these credentials have been verified to work and provide access to iCloud accounts that don’t have security measures like two-factor authentication turned on.
This was determined by testing the credentials using automated scripts and a very large number of proxy servers to avoid getting banned by Apple, the hackers said.
Initially the group asked Apple for the equivalent of $75,000 in Bitcoin or Ethereum cryptocurrency. The ransom value has been raised to $150,000 and the group intends to increase it further if Apple doesn’t pay in three days.
News website Motherboard reported seeing alleged emails between the hackers and Apple in which a member of the company’s security team said that the company does not plan to reward cybercriminals for breaking the law and that the communications have been archived and sent to the authorities.
Apple did not immediately respond to a request for comment.
In the absence of payment, the group plans to launch an automated attack on April 7 that would log into iCloud accounts and wipe their contents and the devices associated with them.
“We are doing this because we can and mainly to spread awareness for Karim Baratov and Kerem Albayrak, which both are being detained for the Yahoo hack and one of them is most probably facing heavy sentencing in America,” a representative for the group said via email. “Kerem Albayrak on the other hand is being accused of listing the database for sale online.”
The representative said that the group’s members are originally from Istanbul, Turkey, but that they now “rep” Green Lanes, an area in North London.
Karim Baratov, a Canadian national, was indicted last week for allegedly hacking into email accounts at various email providers at the request of two officers from the Russian Federal Security Service, the FSB. The same indictment accuses the two FSB officers and a Russian hacker for breaking into Yahoo’s infrastructure and gaining access to over 500 million Yahoo accounts.
The Turkish Crime Family’s claims haven’t been confirmed by Apple so far, but someone posted a video on YouTube showing some of the leaked credentials being used to access iCloud accounts.
The group claims that the person who posted the video is not one of their members, but that he had access to one of the servers hosting their database, which is how he managed to get the credentials and record the video.
The video shows usernames and passwords in plain text, even though Apple most likely doesn’t store passwords in plain text in its database. This would be a very bad security practice and one that serious websites have avoided for many years.
However, it is possible that these passwords were stolen as part of other breaches or cracked from stolen cryptographic hashes and then matched to iCloud accounts due to password reuse practices. Most passwords shown in the video are not complex enough to withstand brute-force attacks.
If Apple does confirm the group’s claims, it could force password resets for its entire iCloud user base just to be on the safe side. Until then, concerned users can change their passwords on their own and turn on the iCloud two-factor authentication feature.
Roblimo tells it like he see’s it (no matter what). Just so happens I also agree with him about 95% of the time, including this blog:
“Why keep supporting a five-year-old operating system? Because, if you work with servers, five years can be just the start.” OR you might just like your current desktop and want to keep it safe . .
“so Canonical found they had enough 12.04 legacy users to justify offering important security fixes for the kernel and the most essential user space packages”.
Steven J. Vaughn-Nichols
So, version 12.04 (2012-April) is Ubuntu’s oldest supported OS. Now, and for current/future releases (16.04), Canonical will support the OS for up to 10 years . . . . and seeing how OTC’ers (nee Slugo-ites) hate to update (ergo Win XP) . . . this is good news!
MS as usual doesn’t opt for security over convenience . . . so, here’s a great little HowTo from HTG explaining what the problem is and how to fix it . . . for our OTC Club members, this should be a priority.
NOTE: If you’re one of the 5 or 6 current members running any Linux or MacOS, this “feature” is disabled by default . . .
More fixes by Adobe for Flash & Shockwave.
Be sure to check if Microsoft has issued a patch yet. Canonical (Ubuntu) released the patch two days ago – just click on the usual “software & updates” launcher icon in the dock.
See link here for details: Adobe Flash Update
Here is “Hardy Heron” . . . (Ubuntu 8.04 (e.g., 2008-April)). See link below for all releases.