It’s funny we live in a world now where a paper and pen is more secure because it can’t be hacked.
What a hilarious comment. This article has NOTHING to do with T-Mobile’s security in general. Almost completely ignoring that it’s 100% Apple’s fault. But let’s just skirt over that and look at T-Mobiles security instead.
"Apple most likely plugs into", if you have evidence of this then sure, otherwise it's a load of made up rubbish.I don't want to be *THAT* guy but... do you really think Apple ensured other providers were protected from brute forcing while just simply forgetting Tmo?
As someone privy to systems like this, it does look like this falls on Tmo. Apple most likely plugs into a secure system, hosted by Tmo, in order to authenticate user pins. This hook into to tmos system is what was not being protected properly. It should be the system that is verifying these credentials that should be preventing the brute force, not the external tools that vendors use to access that system.
This has the benefit of ensuring that no matter how they attempt to authenticate and through whichever provider, service, or tool, the brute force blocks will be consistent. It also means that if someone discovers how to call the hook directly, they can't circumvent Apple's tool to hit it repeatedly with some custom brute force script more efficiently (or after Apple prevents it after patching their UI).
It's either Tmo has allowed Apple unfettered access to some of their most secure data without any sort of oversight or Tmos own tool for verification was failing to check against brute forces while doing the authentication... in my mind either way it was Tmos failure.
"Apple most likely plugs into", if you have evidence of this then sure, otherwise it's a load of made up rubbish.
Your last paragraph is also, again, completely baseless without any evidence. Currently all evidence points to Apple at fault, and until proven otherwise, they hold full responsibility for this problem.
Having the best security =/= flawless security. No tech company is completely flawless. But go ahead and chastise Apple for not being absolutely perfect, because that's so productive.
Apple devices have the best security above all brands. This is a fact and has been confirmed by many cyber security experts in many fraud and cyber security related conferences.But forum members told me that Apple had the best security. Well except for those times when they didn't. Like the root password gate where you didn't have to put a password in to gain root access.
I assume the attacker has tried other carriers as well to do this and found the weakest one was T-Mobile. Fortunate for me and others who stay away from T-Mobile.
A security flaw in Apple's online store exposed the account PINs of more than 72 million T-Mobile customers, reports BuzzFeed News.
The vulnerability was discovered by security researchers Phobia and Nicholas "Convict" Ceraolo, who also found a similar flaw in the website for phone insurance company Asurion that exposed AT&T account PINs.
Both Apple and Asurion fixed the website flaws that left the PINs vulnerable after learning about them from BuzzFeed News. Apple opted not to provide further comment on the situation, but told BuzzFeed News that it is "very grateful to the researchers who found the flaw."
PINs, or passcodes, are numbers that are used as an additional account security measure by many carriers in the United States. Mobile device PINs are typically a last line of defense for a cellular account as both carrier websites and support staff will ask for the PIN for confirmation before making account changes.![]()
The page on Apple's site that let hackers brute force PINs, via BuzzFeed News
SIM hacking, which uses social engineering to get carrier support staff to transfer a person's phone number to a new SIM, has become increasingly prevalent due to the number of accounts (bank, email, social media, etc.) that are tied to a person's phone number. A PIN is used as a defense mechanism against SIM hacking, which means exposed PINs can be particularly dangerous.
Accessing the T-Mobile PINs on Apple's website involved a brute force attack where a hacker used software to input multiple different numeric combinations to guess the proper one.
As BuzzFeed News explains, after initiating a T-Mobile iPhone purchase on the Apple online store and selecting monthly payment options through T-Mobile, Apple's site directs users to an authentication form asking for a T-Mobile number and account PIN or last four digits of a social security number (which most carriers use in place of a PIN when one has not been set).
The page allowed for infinite entry attempts into the PIN field, enabling the brute force attack that let hackers guess PINs associated with a T-Mobile phone number.
The security vulnerability appears to have been limited to T-Mobile accounts, as the same validation page for other carriers on Apple's site uses a rate limit that locks access to the form for 60 minutes after five to 10 incorrect entries. Given that the other carrier pages had rate limiting enabled, it's likely Apple made an error on the T-Mobile page.A similar vulnerability on Asurion's website exposed an unspecified number of AT&T account PINs. An AT&T spokesperson said that it is working with Asurion to investigate the issue and will "take any additional action that may be appropriate."
A phone number was required for both of these attacks, limiting the number of people who may have been impacted, but AT&T and T-Mobile customers who are concerned about their account safety should choose a new PIN.
Article Link: Apple Online Store Security Flaw Exposed PINs of T-Mobile Customers
But forum members told me that Apple had the best security. Well except for those times when they didn't. Like the root password gate where you didn't have to put a password in to gain root access.
"Apple most likely plugs into", if you have evidence of this then sure, otherwise it's a load of made up rubbish.
Your last paragraph is also, again, completely baseless without any evidence. Currently all evidence points to Apple at fault, and until proven otherwise, they hold full responsibility for this problem.
Apple devices have the best security above all brands. This is a fact and has been confirmed by many cyber security experts in many fraud and cyber security related conferences.
[doublepost=1535207392][/doublepost]
I assume the attacker has tried other carriers as well to do this and found the weakest one was T-Mobile. Fortunate for me and others who stay away from T-Mobile.
Absolutely blown away by this, T-Mobile has 72M customers?!?!
If it was Apple's fault, all carriers would be affected. Where I work we create a lot of APIs, some public, the first step was to pick a system to manage API keys and access to all APIs. You can't let someone have free unlimited access to your routes.
You are right in that for any Auth/AuthZ flow, you're going to not only rate limit but also have some type of block if an attack is detected. However, what amuses me about this is if Apple was keen on security including their public facing service layers, they should've had this in place.
I preferApple don't care about security because even after several security incidents customers are brain washed into thinking Apple is flawless.
Having the best security =/= flawless security. No tech company is completely flawless. But go ahead and chastise Apple for not being absolutely perfect, because that's so productive.
So basically, fud then. Moving on.I have no evidence other than working in that industry to know to ask the question: how else is Apple verifying pins? I'm not trying to convince you, but it's worth throwing into the ether.
Apple either has unfettered access to Tmos secure pins or Tmo is not protecting their APIs that verify them.
All situations available says it's Tmos failure to protect their/user data, while only the former scenario places some additional fault on Apple here.
Smh. Another day another Micro, I mean Apple software security bug. Wtf is Craig Federighi getting paid for? I can actively remember when these types of Apple software screwups didn't happen.
So basically, fud then. Moving on.
Are you referring to the fact that Apple devices are usually the first ones to be pwned at various pwn contests (like this one)?Apple devices have the best security above all brands. This is a fact and has been confirmed by many cyber security experts in many fraud and cyber security related conferences.
But forum members told me that Apple had the best security. Well except for those times when they didn't. Like the root password gate where you didn't have to put a password in to gain root access.
Apple don't care about security because even after several security incidents customers are brain washed into thinking Apple is flawless.
No. Not if you call support.But you would still need my password to access your account... no?
You have to have a PIN to verify your account when you call support.What PIN? As a T-Mobile customer for well over a decade I don't have a PIN and don't recall ever having to create one. Changing to a new phone has never been problematic, and even easier thanks to Apple and iCloud. Long gone are the days of wired content porting between the old and new phones. Yes, I have a T-Mobile online account, but it uses a regular password well beyond 4 digits on a PIN.
Given that I spend about 3 weeks in Europe, T-Mobile is the only way to go with free email, text, and wifi to plan limit (unlimited in my case) in most countries. Calls do cost - but not Facetime/Skype. Rules out ATT and Verizon who charge hundreds for the same multi-week non-call international service.
Log in to your account, go to settings, and you will see the PIN/Passcode section where you can change your PIN. Customer service asks you for PIN to verify your account. No one asks for your password when you call in. The Password is only for accessing your account online. The PIN is for authorizing Customer Service reps to access your account.Now I'm confused. I think this means some kind of T-mobile account PIN, which is not the same with my iPhone PIN that I can use to unlock the phone, right? There's no way that either Apple or T-mobile had access to the PIN I use - this would be equivalent to storing my raw fingerprint images on their server!
I use ID and Password when logging in to T-Mobile web site, so I don't even know what PIN they mean here.
Having the best security =/= flawless security. No tech company is completely flawless. But go ahead and chastise Apple for not being absolutely perfect, because that's so productive.