The Software That Could Have Been Used to Hack Nude Celeb Photos is Available to Anyone

By Robert Sorokanich on at

By now you've heard about the massive cache of nude photos that internet hackers stole from a number of female celebrities. Now, researchers are learning more about how the people did it: using a password-cracking software designed for police, but available online to anyone who seeks it.

Over at Wired, Andy Greenberg explains the full story behind Elcomsoft Phone Password Breaker, or EPPB. The Russian-built software makes it possible to download the entire contents of an iCloud account — not just the photos stored to an iCloud account, but a full backup of the entire device.

The method is astoundingly simple: first, hackers use iBrute, an iCloud password-cracking software released over the weekend and still readily available to those who seek it, to get a user's login and password. Once the attacker is logged in to an iCloud account, EPPB convinces iCloud that the device the hacker is using is the victim's iPhone, allowing the hacker to download a full system backup. Just check out Elcomsoft's description of the software's capabilities:

Now your investigation has access to all the secrets stored in iOS, including such highly sensitive data as contacts, call logs, emails, location history, Wi-Fi usernames and passwords, websites, social networking accounts, instant messengers, and more. You can also make a full copy of the device and analyse it in specialised third-party software. Getting evidence is easy with the Elcomsoft iOS toolkit.

EPPB was designed, ostensibly, for government agencies. But over at Wired, Greenberg waded into Anon-IB, an anonymous forum where scumbags trade nude photos stolen using EPPB. The software maker doesn't require any form of government credentials to download, and even if the $400 (£240) price tag throws some hackers off, bootleg copies are widely available.

Apple maintains that this weekend's celebrity nude theft was a targeted attack, rather than an exploitation of security shortcomings in iCloud. But just yesterday, Apple released an update to Find My iPhone purported to fix the flaws that allowed iBrute to work. Though as Greenberg mentions, Anon-IB chatter suggests that the fix hasn't fully stopped the marauders yet.

It's frightening enough to think that law enforcement agencies can pry open your locked data without you knowing it. The fact that anyone with the requisite savvy can use those exact same tools is just astounding. [Wired]

Image: Screenshot from YouTube