{"id":1072,"date":"2016-03-07T20:24:57","date_gmt":"2016-03-08T04:24:57","guid":{"rendered":"https:\/\/www.cloudinsidr.com\/content\/?p=1072"},"modified":"2016-03-22T13:45:23","modified_gmt":"2016-03-22T21:45:23","slug":"seagate-and-apple-hacked","status":"publish","type":"post","link":"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/","title":{"rendered":"Apple and Seagate Hacked"},"content":{"rendered":"<p>Over the years, Apple has dismissed some of\u00a0their\u00a0best technical talent. Today, it came back to bite them: the legendary electronic maker had to admit that they\u00a0got hacked big-time, joining Seagate in this predicament. It made news all over the airwaves.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/zulfikar-ramzan-aa581\" target=\"_blank\">Zulfikar Ramzan<\/a>, the CTO of RSA Security, the\u00a0cyber security behemoth that&#8217;s going to merge into the Dell family, took to the airwaves in response to the news. On\u00a0<a href=\"http:\/\/www.cnbc.com\/closing-bell\/\" target=\"_blank\">CNBC The Closing Bell<\/a> 3\/7\/16,\u00a0he spoke eloquently but rather vaguely about the specifics of the Apple and Seagate hacks. Apparently, he was more interested in making a great RSA sales pitch than in\u00a0giving a cyber security analysis of\u00a0what went wrong at the two companies. He clearly wasn&#8217;t so much into giving the audience actionable intel but\u00a0into\u00a0presenting\u00a0<a href=\"https:\/\/www.rsa.com\/en-us\" target=\"_blank\">RSA<\/a> in the best light possible so as to\u00a0capture leads. Ironically, RSA is plagued by some of the same security vulnerabilities that got Apple and Seagate a prime spot in today&#8217;s newscycle.<\/p>\n<figure id=\"attachment_1073\" aria-describedby=\"caption-attachment-1073\" style=\"width: 720px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/cnbc_apple_seagate\/\" rel=\"attachment wp-att-1073\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1073 size-full\" src=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/CNBC_Apple_Seagate.jpg\" alt=\"Zulfikar Ramzan- Seagate and Apple Hacked- CNBC The Closing Bell 3\/7\/16\" width=\"720\" height=\"460\" srcset=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/CNBC_Apple_Seagate.jpg 720w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/CNBC_Apple_Seagate-600x383.jpg 600w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/CNBC_Apple_Seagate-300x192.jpg 300w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/><\/a><figcaption id=\"caption-attachment-1073\" class=\"wp-caption-text\">Zulfikar Ramzan&#8211;Seagate and Apple Hacked&#8211;<a href=\"https:\/\/www.youtube.com\/watch?v=kSvfRncUH8A&amp;feature=youtu.be&amp;list=PL69kuTXA1IavblempKNFsy3Ji0Ui1klXn&amp;linkId=22144729\" target=\"_blank\">CNBC The Closing Bell 3\/7\/16<\/a> (photo credits: CNBC)<\/figcaption><\/figure>\n<p>Let&#8217;s take a look at Apple and see what the company\u00a0may have done\u00a0to deserve it.<\/p>\n<p>Apple.com uses https encryption but fails to enforce it. Data served\u00a0from<\/p>\n<p><a href=\"http:\/\/images.apple.com\" target=\"_blank\">http:\/\/images.apple.com<\/a><\/p>\n<p>and<\/p>\n<p><a href=\"http:\/\/metrics.apple.com\" target=\"_blank\">http:\/\/metrics.apple.com<\/a><\/p>\n<p>are transferred\u00a0without any encryption whatsoever. Apple\u00a0didn&#8217;t drop merely\u00a0a few balls, they dropped them all: no security headers means no protection of the user of a compliant web browser.<\/p>\n<p><a href=\"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/apple\/\" rel=\"attachment wp-att-1086\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1086\" src=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Apple.jpg\" alt=\"Apple\" width=\"1344\" height=\"612\" srcset=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Apple.jpg 1344w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Apple-600x273.jpg 600w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Apple-300x137.jpg 300w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Apple-768x350.jpg 768w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Apple-1024x466.jpg 1024w\" sizes=\"(max-width: 1344px) 100vw, 1344px\" \/><\/a><\/p>\n<p>That bears repeating: none of the <a href=\"https:\/\/www.cloudinsidr.com\/content\/fixing-your-web-servers-security-headers-from-hall-of-shame-to-hall-of-fame\/\" target=\"_blank\">cyber security headers,<\/a>\u00a0Strict-Transport-Security,\u00a0Content-Security-Policy,\u00a0Public-Key-Pins,\u00a0X-Frame-Options,\u00a0X-XSS-Protection, and\u00a0X-Content-Type-Options, were actually used. Being the biggest stock-market traded IT company somehow got to their heads. Given the blatant ignorance, the cyber security incident was not a matter of if, but only a matter of when.<\/p>\n<p>Furthermore, Apple is&#8211;as of this writing&#8211;vulnerable to\u00a0the DROWN attack due to the use of the SSL v2 protocol.<\/p>\n<p><a href=\"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/drown_attack\/\" rel=\"attachment wp-att-1084\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1084\" src=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/DROWN_attack.jpg\" alt=\"DROWN_attack\" width=\"852\" height=\"552\" srcset=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/DROWN_attack.jpg 852w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/DROWN_attack-600x389.jpg 600w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/DROWN_attack-300x194.jpg 300w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/DROWN_attack-768x498.jpg 768w\" sizes=\"(max-width: 852px) 100vw, 852px\" \/><\/a><\/p>\n<p>This hack, much like\u00a0earlier disasters (including\u00a0the Apple iCloud hack) have been\u00a0long in the making.<\/p>\n<p>Over the years, Apple has fired some of its best technical talent, including, most notably,\u00a0as Avadis Tevenian, the inventor of the OS X kernel,\u00a0and\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/bradydon\" target=\"_blank\">Don Brady, who was in charge of HFS+ and ZFS at Apple for over 20 years and is now a Filesystem &amp; Kernel Software Engineer at Intel<\/a>.<\/p>\n<p>In their place,\u00a0Apple hired away, in marketing, for example\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/angela-ahrendts-0223a376\" target=\"_blank\">Angela Ahrendts, Senior Vice President, Apple Retail<\/a>,\u00a0an amazing marketing talent from Burberry. Great move! She is brilliant, very talented and was the driving force behind the turnaround at Burberry. Sadly, she and other top-notch sales experts, came at the expense of software engineers. Given the billions of Dollars Apple puts aside every quarter, was that really necessary?<\/p>\n<p>Apple is not alone, though. Seagate wasn&#8217;t far behind in terms of its cyber security blunders, and it shows in the results.\u00a0As long as Apple insists on continuing\u00a0this <a href=\"http:\/\/www.fool.com\/investing\/general\/2016\/02\/04\/the-most-troubling-thing-about-apple-incs-iphone-s.aspx\" target=\"_blank\">marketing-only <\/a>strategy, more security breaches are bound to happen.<\/p>\n<p>Seagate&#8217;s web servers run on the museum-grade Apache 2.2, a web server that was cool in the late 90&#8217;s. Today, using any Apache server version is kind of an insult and not so much a sign a great intelligence. Furthermore, the Diffie-Hellman-Key deployed by Seagate is\u00a0just a mere 1024 bit long. Your iPhone or Android phone might hack this easily (though we haven&#8217;t tried).<\/p>\n<p>Having said that, a 1024 bit DH key is just completely inappropriate and more of an invitation to getting hacked than a serious deterrent. Given that, according to <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2015\/10\/breaking_diffie.html\" target=\"_blank\">Bruce Schneier, massive precomputation<\/a> on clouds such as\u00a0AWS and Azure is\u00a0now commonplace and it greatly simplifies breaking Diffie-Hellman keys.\u00a0A weak DH key\u00a0might have been at the core of the\u00a0Seagate and Apple hack.<\/p>\n<p>Another weakness\u00a0in\u00a0Seagate&#8217;s configuration is the lack of\u00a0perfect forward secrecy.<\/p>\n<p>It almost goes without saying that TLS RSA encryption with an RC4 cipher in 128 bit is a\u00a0big no-no! Instead of 128 bit, Seagate should be using\u00a0256 bit. In cyber security, it&#8217;s always better to be safe than sorry.<\/p>\n<p>As far as the <a href=\"https:\/\/www.cloudinsidr.com\/content\/fixing-your-web-servers-security-headers-from-hall-of-shame-to-hall-of-fame\/\" target=\"_blank\">cyber security headers<\/a> are involved, Seagate did a very poor job and dropped a couple of balls, too. For instance, Seagate omitted the headers Content-Security-Policy,\u00a0X-Frame-Options,\u00a0X-XSS-Protection,and\u00a0X-Content-Type-Options. Especially the Cross Site Request Forgery (XSS) header (a.k.a.\u00a0X-XSS-Protection) might have helped to prevent the attack.<\/p>\n<p><a href=\"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/seagate\/\" rel=\"attachment wp-att-1088\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1088\" src=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Seagate.jpg\" alt=\"Seagate\" width=\"1344\" height=\"614\" srcset=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Seagate.jpg 1344w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Seagate-600x274.jpg 600w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Seagate-300x137.jpg 300w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Seagate-768x351.jpg 768w, https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/Seagate-1024x468.jpg 1024w\" sizes=\"(max-width: 1344px) 100vw, 1344px\" \/><\/a><\/p>\n<p>In a nutshell, Seagate did a very sloppy job. Unfortunately, sloppy cyber security seems to be the new normal and that&#8217;s why these cyber attacks keep coming (See also:\u00a0<a href=\"https:\/\/www.linkedin.com\/pulse\/next-frontier-hacks-data-leaks-how-http2-fits-picture-filipe-martins?trk=mp-author-card\" target=\"_blank\">The Next Frontier: Hacks, Data Leaks, and How HTTP\/2 Fits the Picture of Cyber Sovereignty<\/a>).<\/p>\n<p>Stay tuned for more at <a href=\"https:\/\/www.cloudinsidr.com\/content\/\" target=\"_blank\">CloudInsidr<\/a>\u00a0and subscribe to our newsletter!<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the years, Apple has dismissed some of\u00a0their\u00a0best technical talent. Today, it came back to bite them: the legendary electronic maker had to admit that they\u00a0got hacked big-time, joining Seagate in this predicament. It made news all over the airwaves.<\/p>\n","protected":false},"author":1,"featured_media":1073,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[17,33,111,115,89,6],"tags":[135,139,138,137,142,140,141,136],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple and Seagate Hacked - CloudInsidr<\/title>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple and Seagate Hacked - CloudInsidr\" \/>\n<meta property=\"og:description\" content=\"Over the years, Apple has dismissed some of\u00a0their\u00a0best technical talent. Today, it came back to bite them: the legendary electronic maker had to admit that they\u00a0got hacked big-time, joining Seagate in this predicament. It made news all over the airwaves.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"CloudInsidr\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-08T04:24:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-03-22T21:45:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/CNBC_Apple_Seagate.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"460\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#website\",\"url\":\"https:\/\/www.cloudinsidr.com\/content\/\",\"name\":\"CloudInsidr\",\"description\":\"Cyber security, infotech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.cloudinsidr.com\/content\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.cloudinsidr.com\/content\/wp-content\/uploads\/2016\/03\/CNBC_Apple_Seagate.jpg\",\"width\":720,\"height\":460,\"caption\":\"Zulfikar Ramzan--Seagate and Apple Hacked--CNBC The Closing Bell 3\/7\/16 (photo credits: CNBC)\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/#webpage\",\"url\":\"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/\",\"name\":\"Apple and Seagate Hacked - CloudInsidr\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/#primaryimage\"},\"datePublished\":\"2016-03-08T04:24:57+00:00\",\"dateModified\":\"2016-03-22T21:45:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#\/schema\/person\/dd6ee9cb21cf05763fd7cff3d6f11b2b\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudinsidr.com\/content\/seagate-and-apple-hacked\/\"]}]},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#\/schema\/person\/dd6ee9cb21cf05763fd7cff3d6f11b2b\",\"name\":\"Cloud Insidr\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.cloudinsidr.com\/content\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b2fa1415b3d573b97d818b8f8f83b7c?s=96&d=mm&r=g\",\"caption\":\"Cloud Insidr\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts\/1072"}],"collection":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/comments?post=1072"}],"version-history":[{"count":22,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts\/1072\/revisions"}],"predecessor-version":[{"id":1174,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/posts\/1072\/revisions\/1174"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/media\/1073"}],"wp:attachment":[{"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/media?parent=1072"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/categories?post=1072"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudinsidr.com\/content\/wp-json\/wp\/v2\/tags?post=1072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}