Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
IOS Security Apple Your Rights Online

Apple Finally Fixes Unencrypted App Store Login 52

Deekin_Scalesinger writes "More than eighteen months after being first brought to Cupertino's attention, Apple gets around to addressing insecure logins to the App Store. In theory, this could be used to view lists of installed apps and make unauthorized purchases." Yep, they were sending login information over plain http.
This discussion has been archived. No new comments can be posted.

Apple Finally Fixes Unencrypted App Store Login

Comments Filter:
  • Oh boy! (Score:5, Insightful)

    by Fuzzums ( 250400 ) on Saturday March 09, 2013 @05:28PM (#43127593) Homepage

    /. redirects me from https back to http.
    So what about that?

  • Re:Oh boy! (Score:4, Insightful)

    by Nemyst ( 1383049 ) on Saturday March 09, 2013 @05:29PM (#43127599) Homepage
    Slashdot doesn't have direct access to your credit card.
  • Typical haters (Score:5, Insightful)

    by etresoft ( 698962 ) on Saturday March 09, 2013 @05:39PM (#43127663)

    Yep, they were sending login information over plain http.

    The author of the original article was very careful with what he did and didn't say. He didn't say that Apple sent login information over plain http. And if you read the support document [apple.com] where Elie Bursztein gets his 15 seconds of Apple fame, you will see that Apple says the update now encrypts "active content". In short, login information was never sent over plain text.

  • by santax ( 1541065 ) on Saturday March 09, 2013 @07:54PM (#43128225)
    "For the past nine months—and possibly for years—Apple has unnecessarily left many of its iOS customers open to attack because engineers failed to implement standard technology that encrypts all traffic traveling between handsets and the company's App Store." Yeah, they took time... a lot of time.
  • Re:Nice summary (Score:5, Insightful)

    by tlambert ( 566799 ) on Sunday March 10, 2013 @12:17AM (#43129077)

    Since every app has to be signed by apple's key, how would a hacker get their software on your phone?

    Only thing I can think of is create a jailbreak and try to deploy it via an App Store GUI

    Look, I'm an Apple fan, being a former employee, but that is honestly a naive question, at best.

    The point attack vector on you is not tor trojan your iDevice, it is to hijack your account credentials. There are a lot of things you can do with hijacked App Store/iTunes credentials:

    (1) Buy a lot of stuff from the store on your credit card associated with the account. Who cares if it's ever installed anywhere, it costs you money and Apple reputation

    (2) Astroturf an application to raise its ratings in the store by posting reviews.

    (3) Inflate sales numbers for an App; this is similar to astroturfing as well, but along a different axis.

    (4) Obtain a portion of your credit card number to obtain credentials elsewhere you have accounts; Apple verifies with accounts wih the credit card number, but uses the very public part of the credit card number, which is why account hijack attacks occur

    (5) Deauthorize all your devices

    (6) Authorize an additional device; if your slots aren't all full, you aren't going to notice this, and in combination with #1, this will allow them to utilize your account to obtain content for the device

    (7) Track the location of your device (and by inference, you), and plan an attack on you, rob your house while you are too far away to get back in time, or just notice that your Mac Latop and your iPhone are in different locations, the iPhone is moving, and then, hey, free laptop

    (8) Remote wipe your device(s)

    (9) Use "Back To My Mac to remotely access your laptop/desktop system

    (10) Authorize and iSync another device, and obtain access to all your personally created content, like your address book contents, business contacts, and in the case of them installing all the Apps you have installed on your device on a similar device, obtain all the personal information in those apps as well from the iSync'ed device

    (11) Access your keychain contents using #10, and if one of your devices is a laptop/desktop/in-some-cases-ipad, log in to al the accounts you have elsewhere (including maybe HRBlock.com?) that Safari kindly offered to "Remember my password for this site?" for you

    (12) Remote access your camera, if you happen to have an App that can do that.

    There. A dozen reasons why it's a bad thing, and that's without breaking a sweat, or pulling in indirect attacks, like the fact that a lot of foolish people tend to use the same login and password everywhere, and once they have it for yourApp store account, they probably have it for other accounts as well.

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...