A security researcher has published attack code he said makes it easy to steal the iCloud passwords of people using the latest version of Apple iOS for iPhones and iPads.
The proof-of-concept attack exploits a flaw in Mail.app, the default iOS e-mail program. Since the release of version 8.3 in early April, the app has failed to properly strip out potentially dangerous HTML code from incoming e-mail messages. The proof-of-concept exploit capitalizes on this failure by downloading a form from a remote server that looks identical to the legitimate iCloud log-in prompt. It can be displayed each time the booby-trapped message is viewed.
(Score: 3, Insightful) by Anonymous Coward on Thursday June 11 2015, @10:24PM
This could be used for harvesting any sort of account info, not just iCloud accounts. If someone is dumb enough to fall for an iCloud login form in the body of an email, they'd probably fall for any login form.
(Score: 2) by captain normal on Friday June 12 2015, @05:55AM
Number 1---(where did I first hear this?) No one ever went broke underestimating the intelligence of the American public.
Number 2--- Every one who buys into the Apple myth believes that there is no way any iOS product is open to malware. So, suckers from the git-go.
Everyone is entitled to his own opinion, but not to his own facts"- --Daniel Patrick Moynihan--
(Score: 2) by darkfeline on Saturday June 13 2015, @02:36AM
From the article, it is NORMAL for the mail app to randomly prompt for your iCloud password. So an intelligent user wouldn't be crazy to enter his info into such a prompt. The prompt is also identical in appearance. The "fix" for this exploit is: don't enter your iCloud password while you have an email open (seriously).
Join the SDF Public Access UNIX System today!