{"id":7092,"date":"2017-03-23T09:10:03","date_gmt":"2017-03-23T17:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/23\/news-883\/"},"modified":"2017-03-23T09:10:03","modified_gmt":"2017-03-23T17:10:03","slug":"news-883","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/23\/news-883\/","title":{"rendered":"Hackers threaten to wipe Apple devices"},"content":{"rendered":"<p><strong>Credit to Author: Thomas Reed| Date: Thu, 23 Mar 2017 15:00:40 +0000<\/strong><\/p>\n<p>According to <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/hackers-we-will-remotely-wipe-iphones-unless-apple-pays-ransom\" target=\"_blank\">a report from Motherboard<\/a>, a group of hackers calling themselves &#8220;Turkish Crime Family&#8221; is threatening to remotely erase devices belonging to hundreds of millions\u00a0of Apple customers. They will do this on April 7, they say, if Apple doesn&#8217;t pay them a ransom.<\/p>\n<p>The hackers claim to have access to over 300 million iCloud e-mail addresses (addresses ending in @icloud.com, @me.com, or @mac.com), and 559 million Apple ID accounts in all. (Keep in mind that an Apple ID need not be associated with an iCloud e-mail address.) However, the hackers have provided no proof of this, beyond a supposed YouTube video showing them logging on to a few iCloud accounts.<\/p>\n<p>I&#8217;m a bit skeptical of these claims. I seriously doubt that they have the credentials to access that many accounts.\u00a0There&#8217;s no indication that there has been an Apple ID\u00a0breach, so it seems more likely that their source of credentials &#8211; if any &#8211; would be from phishing scams.<\/p>\n<p>However, it would take time for phishing scams to gather that many accounts and some of the data gathered would &#8220;expire,&#8221; as people change passwords or enable two-factor authentication. (It&#8217;s not unusual for people to fall for a phishing scam, but get suspicious after they&#8217;ve provided their credentials due to unexpected results.)<\/p>\n<p>It could also, of course, be a sham. The hackers could have a handful of credentials that they used to make their YouTube video and they&#8217;re pretending to have more in hopes that Apple will pay their ransom.<\/p>\n<p>Still, there&#8217;s a very real chance that at least some number of Apple devices could get remotely locked or erased on April 7. If you have a Mac, iPhone, or iPad, what can you do to make sure this doesn&#8217;t happen to you? There are a few basic steps you can take to ensure that, if these hackers are telling the truth, you aren&#8217;t among the victims.<\/p>\n<p>&nbsp;<\/p>\n<h3>Change your password<\/h3>\n<p>First and foremost, change the password for\u00a0your Apple ID. To do so, simply log in here:<\/p>\n<p><a href=\"https:\/\/appleid.apple.com\" target=\"_blank\">https:\/\/appleid.apple.com<\/a><\/p>\n<p>Once you&#8217;re logged in, scroll down to the Security section and click the Change Password link.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-change-password.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-16954\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-change-password-600x137.png\" alt=\"\" width=\"600\" height=\"137\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-change-password-600x137.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-change-password-300x68.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<h3>Enable two-factor authentication<\/h3>\n<p>Your password is only one barrier to entry to your Apple ID account and it&#8217;s not really enough these days. Two-factor authentication (2FA) requires you to have\u00a0two things in order to log in to your iCloud\/Apple ID account: something you know (your password) and something you have. In the case of an Apple ID, that second factor is a trusted device, which could be any of your Apple devices.<\/p>\n<p>When you enable two-factor authentication,\u00a0you will get alerts on your trusted device(s) whenever someone tries to log in to your Apple ID. You will be shown a map of the general area the access is coming from\u00a0and can allow or disallow it. If you allow it, you&#8217;ll be asked to enter a 6-digit code, which is displayed on your trusted device(s). This code is different every time.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-2FA.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-16955\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-2FA-600x244.png\" alt=\"\" width=\"600\" height=\"244\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-2FA-600x244.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-2FA-300x122.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-2FA.png 980w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>Obviously, this isn&#8217;t much of a deterrent for someone who has physical access to one of your trusted devices and who knows your Apple ID password. However, this is quite good for protecting against remote access to your Apple ID by someone who has captured your password.<\/p>\n<p>To learn more about Apple&#8217;s two-factor authentication, including how to enable it, see:<\/p>\n<p><a href=\"https:\/\/support.apple.com\/HT204915\" target=\"_blank\">https:\/\/support.apple.com\/HT204915<\/a><\/p>\n<p>Note that if you currently have Apple&#8217;s older two-step verification turned on, which uses four-digit codes, that is pretty good, but not\u00a0quite as secure. It&#8217;s adequate to protect against this particular threat, but at some point you should consider <a href=\"https:\/\/support.apple.com\/HT207198\" target=\"_blank\">switching over to two-factor authentication<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h3>Disable Find My Mac\/iPhone<\/h3>\n<p>Personally, I want to keep this feature turned on for all my devices. This allows me to remotely wipe any device that has been lost or stolen, potentially find a lost device by making it play\u00a0a loud sound, and other useful things. If you&#8217;ve taken the precautions above turning this feature off\u00a0shouldn&#8217;t be necessary.<\/p>\n<p>However, if your opinion differs from mine and you don&#8217;t want to be able to remotely locate and take action on a device from your iCloud account, you can disable Find My Mac or Find My iPhone on that device.<\/p>\n<p>On a Mac, open System Preferences and click the iCloud icon. Then simply uncheck the Find My Mac box, at\u00a0the bottom of the list.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-Find-My-Mac.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-16956\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-Find-My-Mac-600x407.png\" alt=\"\" width=\"600\" height=\"407\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-Find-My-Mac-600x407.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-Find-My-Mac-300x203.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-Find-My-Mac.png 1336w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>On an iOS device (e.g. an iPhone or iPad), open the Settings app and tap the iCloud item, then scroll down to\u00a0the Find My iPhone item.<br \/> <a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-Find-My-iPhone.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-16957\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-Find-My-iPhone-337x600.png\" alt=\"\" width=\"337\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-Find-My-iPhone-337x600.png 337w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-Find-My-iPhone-169x300.png 169w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/Apple-ID-Find-My-iPhone.png 750w\" sizes=\"auto, (max-width: 337px) 100vw, 337px\" \/><\/a><\/p>\n<p>If Find My iPhone is listed as being turned on, tap it, and on the next page, flip the &#8220;switch&#8221; to turn it off.<\/p>\n<p>Once Find My Mac\/iPhone is disabled, even if a hacker somehow manages to gain access to your iCloud account, they will be unable to remotely wipe or lock that device. That also means, however, that you will be unable to do anything about it if someone steals that device.<\/p>\n<p>&nbsp;<\/p>\n<h3>Back up your devices<\/h3>\n<p>If all else fails and your device does somehow get wiped &#8211; or if it gets lost, stolen, destroyed, the data is corrupted somehow, or any other issue that can cause data loss occurs &#8211; a good set of backups is important.<\/p>\n<p>Your Mac can be backed up very easily using <a href=\"https:\/\/support.apple.com\/HT201250\" target=\"_blank\">Time Machine<\/a>, a third-party backup program, or one of the various cloud-based backup services. Whatever you do, make sure that your files are backed up both locally (on one or more hard drives in your home or office) as well as off-site (either an online backup or on a hard drive that you keep in another location).<\/p>\n<p>Your iOS devices can be backed up to iCloud, but of course, if someone gains access to your iCloud account, that&#8217;s not\u00a0adequate protection. I recommend also backing up onto your computer periodically via iTunes. If that\u00a0computer is kept backed up, that protects your iOS device backups as well.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/hackers-threaten-wipe-apple-devices\/\">Hackers threaten to wipe Apple devices<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/hackers-threaten-wipe-apple-devices\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Thomas Reed| Date: Thu, 23 Mar 2017 15:00:40 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/hackers-threaten-wipe-apple-devices\/' title='Hackers threaten to wipe Apple devices'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/photodune-15766515-desk-with-various-gadgets-and-office-supplies-flat-lay-xxl2.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>According to a report from Motherboard, a group of hackers calling themselves &#8220;Turkish Crime Family&#8221; is threatening to remotely erase devices belonging to hundreds of millions of Apple customers. They will do this on April 7, they say, if Apple doesn&#8217;t pay them a ransom.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/mac-cybercrime\/\" rel=\"category tag\">Mac Cybercrime<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple\/\" rel=\"tag\">Apple<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple-id\/\" rel=\"tag\">Apple ID<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach\/\" rel=\"tag\">data breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/icloud\/\" rel=\"tag\">icloud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ios\/\" rel=\"tag\">iOS<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/iphone\/\" rel=\"tag\">iPhone<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing\/\" rel=\"tag\">phishing<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/hackers-threaten-wipe-apple-devices\/' title='Hackers threaten to wipe Apple devices'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/03\/hackers-threaten-wipe-apple-devices\/\">Hackers threaten to wipe Apple devices<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2211,11724,4503,11172,11462,10480,8826,11723,3924],"class_list":["post-7092","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apple","tag-apple-id","tag-cybercrime","tag-data-breach","tag-icloud","tag-ios","tag-iphone","tag-mac-cybercrime","tag-phishing"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7092"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7092\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7092"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}