Jump to content

iCloud Keychain Sync Security Flaw

Apple's Keychain access has for a while now utilized End-to-end data encryption to protect their users sensitive data. But now, a previously thought patched, security exploit within iClouds verification of device keys, which can allow attackers to bypass the end-to-end encryption and steal users Passwords and other sensitive information. 

Quote

The bug exploited a flaw in how Apple's iCloud Keychain synchronizes sensitive data across devices, like passwords and credit cards on file, which -- if exploited -- could've let a sophisticated attacker steal every secret stored on an iPhone, iPad, or Mac. 

The worst thing about this is that it was thought to have been patched a while ago, and that this flaw is completely silent to users. 

Quote

the flaw could have let an attacker punch a hole in the end-to-end encryption that Apple uses to ensure nobody can read data as it is sent across the internet.

That data can be intercepted by an attacker to steal passwords and other secret data, like the websites you visit and their passwords, as well as Wi-Fi network names and their passwords.

It has been noted though, that accounts that use two factor authentication are much better protected from this type of attack. 

Alex Radocea, founder of Longterm Security,  stated that:

Quote

We could see everything in the Keychain in plain-text, it's completely silent to users, they wouldn't have seen a device being added.

 

Source:

http://www.zdnet.com/article/icloud-security-flaw-icloud-keychain-iphone-mac-passwords-vulnerable/

http://www.techrepublic.com/article/icloud-keychain-encryption-bug-exposes-ios-passwords-credit-card-numbers/

Link to comment
Share on other sites

Link to post
Share on other sites

It seems like this was already fixed.

Quote

Apple released a fix in March, with iOS 10.3 and macOS Sierra 10.12.4.

Or was that the fix that didn't end up working?

 

Also it seems they still need to get access via a compromised iCloud account.

Quote

"With the bug I couldn't go ahead and steal whoever's iCloud Keychain just by knowing their account name. I would also need access to their iCloud account somehow,"

 

That seems like kinda a big hurdle and once you get access to their account you basicly have access anyways. The user would just be able to see the new device accessing the keychain vs the bug which accesses it invisibly.

 

Another question I have is what about when you use two different passwords for your iCloud acc and keychain?

My posts are in a constant state of editing :)

CPU: i7-4790k @ 4.7Ghz MOBO: ASUS ROG Maximums VII Hero  GPU: Asus GTX 780ti Directcu ii SLI RAM: 16GB Corsair Vengeance PSU: Corsair AX860 Case: Corsair 450D Storage: Samsung 840 EVO 250 GB, WD Black 1TB Cooling: Corsair H100i with Noctua fans Monitor: ASUS ROG Swift

laptop

Some ASUS model. Has a GT 550M, i7-2630QM, 4GB or ram and a WD Black SSD/HDD drive. MacBook Pro 13" base model
Apple stuff from over the years
iPhone 5 64GB, iPad air 128GB, iPod Touch 32GB 3rd Gen and an iPod nano 4GB 3rd Gen. Both the touch and nano are working perfectly as far as I can tell :)
Link to comment
Share on other sites

Link to post
Share on other sites

18 hours ago, JohnnyCorporalTech said:

It has been noted though, that accounts that use two factor authentication are much better protected from this type of attack. 

I'm good then.  Two factor on iOS is so seamless that everyone should use it.  You don't even have to go into an app to use it.

Workstation:  14700nonk || Asus Z790 ProArt Creator || MSI Gaming Trio 4090 Shunt || Crucial Pro Overclocking 32GB @ 5600 || Corsair AX1600i@240V || whole-house loop.

LANRig/GuestGamingBox: 9900nonK || Gigabyte Z390 Master || ASUS TUF 3090 650W shunt || Corsair SF600 || CPU+GPU watercooled 280 rad pull only || whole-house loop.

Server Router (Untangle): 13600k @ Stock || ASRock Z690 ITX || All 10Gbe || 2x8GB 3200 || PicoPSU 150W 24pin + AX1200i on CPU|| whole-house loop

Server Compute/Storage: 10850K @ 5.1Ghz || Gigabyte Z490 Ultra || EVGA FTW3 3090 1000W || LSI 9280i-24 port || 4TB Samsung 860 Evo, 5x10TB Seagate Enterprise Raid 6, 4x8TB Seagate Archive Backup ||  whole-house loop.

Laptop: HP Elitebook 840 G8 (Intel 1185G7) + 3080Ti Thunderbolt Dock, Razer Blade Stealth 13" 2017 (Intel 8550U)

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×