A hacker has released a tool called iDict that he sustains that could be used to break into any iCloud account. According to the expert, iDict implements an exploit that is able to bypass restrictions countermeasures designed by Apple to prevent account hacking.
The user Pr0x13 posted the code of iDict on GitHub, Pr0x13 explains that the code is very easy to use and exploits a very simple mechanism implemented to protect the iCloud accounts. Below an excerpt from the iDict page.
What is this? A 100% Working iCloud Apple ID Dictionary attack that bypasses Account Lockout restrictions and Secondary Authentication on any account.
What this isn’t: A bypass or fully automated removal
Why? This bug is painfully obvious and was only a matter of time before it was privately used for malicious or nefarious activities, I publicly disclosed it so apple will patch it.
Basically, the tool run a dictionary attack on iCloud Apple ID that bypasses account lockout restrictions and secondary authentication on any account.
The disclaimer explains that the usage of the tool for hacking into iCloud account is illegal, @Pr0x13 decline any responsibility for damages caused by the iDict tool and confirm that he hasn’t broken any account.
“I Didn’t exploit any accounts while writing this, as well i didn’t even test it out (Hope it works lol). I merely observed and reported.”states @Pr0x13
In time I’m writing the unique confirmation on the efficiency of iDict is provided by Twitter and Reddit users which are claiming to have successfully tested it.
According to Pr0x13, iDict is able to guess passwords over and over avoiding to be blocked by countermeasures implemented by Apple, it is also able to bypass the two-factor authentication (aka two-step verification)mechanism implemented by Apple to allow users the verification of login attempts. iDict just requires its users to know the email address associated with the targeted iCloud account before it tries to break into it.
If iDict works as explained, the unique possibility for the iCloud users to defend their account is to avoid to share online their email address.
Is this the right time for a new series of Fappening cases?
(Security Affairs – iDict, iCloud hacking)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.