{"id":32677,"date":"2017-07-25T16:44:15","date_gmt":"2017-07-25T20:44:15","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/icloud-keychain-encryption-bug-exposes-ios-passwords-credit-card-numbers-techrepublic.php"},"modified":"2017-07-25T16:44:15","modified_gmt":"2017-07-25T20:44:15","slug":"icloud-keychain-encryption-bug-exposes-ios-passwords-credit-card-numbers-techrepublic","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/icloud-keychain-encryption-bug-exposes-ios-passwords-credit-card-numbers-techrepublic.php","title":{"rendered":"iCloud Keychain encryption bug exposes iOS passwords, credit card numbers &#8211; TechRepublic"},"content":{"rendered":"<p><p>    A largely unreported iOS security flaw undermined iCloud's    end-to-end encryption capability, and could have allowed    attackers to steal passwords, credit cards, and any other    information on file, according to security firm Longterm    Security.  <\/p>\n<p>    iCloud Keychain enables users to store passwords and credit    card numbers across all of their devices, while iCloud Keychain    Sync allows users to share this information securely between    devices. The security flaw was found in iCloud Keychain Sync's    custom Off-The-Record (OTR) implementation, Longterm Security    co-founder Alex Radocea wrote in a blog post.  <\/p>\n<p>    \"The bug we found is exactly the kind of bug law enforcement or    intelligence would look for in an end-to-end encryption    system,\" Radocea told ZDNet.  <\/p>\n<p>    The flaw was addressed in the iOS    10.3 updatedemonstrating again why it's important to stay    on top of     updating your device.  <\/p>\n<p>    SEE: Learn Website Hacking and Penetration Testing    From Scratch (TechRepublic Academy)  <\/p>\n<p>    iCloud Keychain's OTR encryption protocol uses key verification    to protect a user's devices by ensuring information can pass    securely between multiple devices. Radocea was able to bypass    the signature verification process via a man-in-the-middle    attack. He was also able to intercept traffic from devices, and    modify OTR packets in transit to deliberately get an invalid    signature, ZDNet reported. After this, he was able to get a    device approved.  <\/p>\n<p>    \"We could see everything [in the Keychain] in plain-text,\"    Radocea told ZDNet. Making matters more dangerous, \"it's    completely silent to users,\" he said. \"They wouldn't have seen    a device being added.\"  <\/p>\n<p>    Weak, reused, and leaked passwords are a primary method of    entry for cybercriminals, Radocea wrote in the blog post,    making password hygiene critical for enterprise users. In 2016    alone, more than 500 million credentials surfaced publicly from    mass-hack password dumps, combined with poor password storage    practices, he added.  <\/p>\n<p>    \"Due to the risk of future mass dumps, passwords alone are just    no longer a strong defense mechanism for sensitive data,\"    Radocea wrote. \"It is a very good idea for organizations to    further harden access to any important personal information.\"  <\/p>\n<p>    Current best practices include multi-factor authentication and    end-to-end encryption, such as OTR, Radocea wrote.  <\/p>\n<p>    Longterm Security will present more information on the issue in    a session at Black Hat on Wednesday.  <\/p>\n<p>    Image: iStockphoto\/Wachiwit  <\/p>\n<p>    1. A security flaw undermined iCloud's end-to-end encryption    capability, and could have allowed criminals to steal passwords    and credit cards, according to Longterm Security.  <\/p>\n<p>    2. The flaw was addressed in the iOS 10.3 update, so users    should update if they haven't done so.  <\/p>\n<p>    3. Enterprises shouldn't rely on passwords alone to protect    sensitive data, and should use multi-factor authentication and    end-to-end encryption.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continued here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.techrepublic.com\/article\/icloud-keychain-encryption-bug-exposes-ios-passwords-credit-card-numbers\/\" title=\"iCloud Keychain encryption bug exposes iOS passwords, credit card numbers - TechRepublic\">iCloud Keychain encryption bug exposes iOS passwords, credit card numbers - TechRepublic<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A largely unreported iOS security flaw undermined iCloud's end-to-end encryption capability, and could have allowed attackers to steal passwords, credit cards, and any other information on file, according to security firm Longterm Security. iCloud Keychain enables users to store passwords and credit card numbers across all of their devices, while iCloud Keychain Sync allows users to share this information securely between devices. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32677","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32677"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32677"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32677\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}