Update: The exploit seems to now be patched. Interestingly enough, Apple's iCloud Photos app also disappeared earlier this morning, so perhaps the company is already aware of the issue and is working on a fix.įor now, we recommend using a very strong password! Pr0x13 says the hole was "painfully obvious" and it was only a matter of time before it was used privately for malicious activities therefore, he released it publicly so Apple could close it.Īpple will surely patch this exploit quickly, especially with the recent hack on celebrity iCloud accounts. Additionally, you need to have the account's email address in order to attempt to crack the password. The tool uses a dictionary of common passwords and attempts to find a match, so if you're password isn't on the list, you're safe however, another hacker could always use a different dictionary. This means whilst it will succeed '100' at trying 500 times over, the tool is by no means guaranteed to succeed at cracking your password. At the time, the dictionary file only contains 500-word-long list of passwords. iDict bypasses the restriction and essentially has an "unlimited" amount of attempts to guess at an account's password. iDict, currently hosted at GitHub, is limited by the size of the dictionary the tool uses to guess the password. IDict, a new tool released by Pr0x13, claims to bypass brute-force safeguards and two-factor authentication when cracking an iCloud account password.Ĭurrently Apple locks a user's account if it notices many incorrect password attempts in a short amount of time.
0 Comments
Leave a Reply. |