{"id":2469,"date":"2014-09-03T15:53:39","date_gmt":"2014-09-03T15:53:39","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=2469"},"modified":"2020-02-27T03:48:23","modified_gmt":"2020-02-26T16:48:23","slug":"celebrities-photos-leak-why-should-businesses-care","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/celebrities-photos-leak-why-should-businesses-care\/2469\/","title":{"rendered":"Celebrities&#8217; photos leak: why should businesses care?"},"content":{"rendered":"<p>Everyone has at least heard something about a recent leak of very personal data from a number of Hollywood stars. Somebody, somehow, managed to steal a number of stars\u2019 private photos that were not supposed to be publicized. How this was done and who was behind it is not yet known. The only certain thing is that they were published on 4chan, a notorious imageboard, widely considered to be the \u201cheart\u201d of Anonymous internet subculture. Anonymous, in turn, are spearheading anti-surveillance, pro-privacy activism (on the Web, mostly). Apparently their notion of people\u2019s privacy doesn\u2019t cover private selfies of attractive celebrities. But, well, enough of this. After all there\u2019s much to talk about from the business angle here. <\/p><blockquote class=\"twitter-pullquote\"><p>Celebrities\u2019 photos leak: why should businesses care?<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FL9NX&amp;text=+Celebrities%26%238217%3B+photos+leak%3A+why+should+businesses+care%3F\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>First of all, nothing goes from nowhere: if someone stole personal data, then there was a vulnerability in the storage locker. The first suspect was iCloud \u2013 there was a flaw, discovered as recently as earlier this week, and patched pretty quickly. <a href=\"http:\/\/thenextweb.com\/apple\/2014\/09\/01\/this-could-be-the-apple-icloud-flaw-that-led-to-celebrity-photos-being-leaked\/\" target=\"_blank\" rel=\"noopener nofollow\">According to The Next Web<\/a>, on Monday, a Python script emerged on GitHub that appeared to have allowed malicious users to \u201cbrute force\u201d a target account\u2019s password on Apple\u2019s iCloud. To \u201cbrute force\u201d in this case means to make an unlimited number of attempts to guess passwords, without any \u201cretaliation\u201d from the system (which is a Gargantuan-sized security hole). Actually, it was a vulnerability in the Find My iPhone service that made it possible. Fortunately, Apple reacted promptly and fixed the problem.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>\u201cFind My Phone\u201d flaws have been <a href=\"https:\/\/business.kaspersky.com\/information-security-digest-may-14\/1946\" target=\"_blank\" rel=\"noopener nofollow\">used before<\/a> to lock phones and demand ransom. However this time Apple declared that iCloud wasn\u2019t breached in celebrity photo leak, and those were individual accounts targeted:<\/p>\n<p><em>\u201cAfter more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet. None of the cases we have investigated has resulted from any breach in any of Apple\u2019s systems including iCloud or Find my iPhone. We are continuing to work with law enforcement to help identify the criminals involved,\u201d<\/em><a href=\"http:\/\/thenextweb.com\/apple\/2014\/09\/02\/apple-claims-icloud-wasnt-breached-celebrity-photo-leak\/\" target=\"_blank\" rel=\"noopener nofollow\">Apple said<\/a>. It also advised to use strong password and enable two-step verification. It\u2019s quite logical to assume that in the case of the attacked celebrities strong passwords were not present. Neither was two-step verification, apparently.<\/p>\n<p>In this regard, three things need emphasizing here.<\/p>\n<p>1. Apple\u2019s devices and services may be a bit more secure than the rest (or at least they are considered so), but they are definitely not immune to targeted attacks, and they have flaws too. Also, weak password and lack of two-step verification make any other protective efforts all but futile. This is a reminder for businesses employing BYOD in their networks and people who keep their working data on their personal iPhones.<\/p>\n<p>2. For both individual users and businesses it is true that any sensitive information remains private until there is a more than a hypothetical possibility of an unsanctioned access to it. Or, to put it simple, the data is only private as long as you control the access to it. Be it personal pics or secret business docs, if you have them on your personal mobile devices, someone can crack the weak password, or just steal your device, etc. The data then changes hands or even becomes public. But if it is stored in an encrypted form, hackers will be in a muck of sweat trying to get to your data. <\/p><blockquote class=\"twitter-pullquote\"><p>Private data is private as long as you control access to it.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FL9NX&amp;text=Private+data+is+private+as+long+as+you+control+access+to+it.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>3. It\u2019s very common for the phishers to use stolen or mined personal data as leverage for their targeted attacks \u2013 mainly to raise credibility of their messages and thus to lure other people to malicious sites or plant malware on their PCs. <a href=\"https:\/\/business.kaspersky.com\/commercialization-of-phishing\" target=\"_blank\" rel=\"noopener nofollow\">We have described these scenarios before<\/a>. The problem is aggravated further by the fact that people often put a lot of personal data online themselves. And it is also used with malicious intent.<\/p>\n<p>We leave it to our readers to draw conclusions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A number of celebrities private (very private) photos were leaked. While it is first and foremost a blatant invasion of privacy, this is also a wake-up call for businesses.<\/p>\n","protected":false},"author":209,"featured_media":15791,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[2163,282,2164,961,270,2166],"class_list":{"0":"post-2469","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-brute-force-attacks","10":"tag-cybersecurity","11":"tag-icloud-storage","12":"tag-leaks","13":"tag-password-security","14":"tag-protecting-your-data"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/celebrities-photos-leak-why-should-businesses-care\/2469\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/celebrities-photos-leak-why-should-businesses-care\/2469\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/celebrities-photos-leak-why-should-businesses-care\/2469\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/brute-force-attacks\/","name":"brute force attacks"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=2469"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2469\/revisions"}],"predecessor-version":[{"id":26487,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/2469\/revisions\/26487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/15791"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=2469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=2469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=2469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}