Apple iCloud hack in China from 2014 - Case Study (Introduction)

In 2014, Apple iCloud service was hacked in China. It allows collecting the sensitive data, such as AppleID, password and other personal data of iPhone users from the most populous country (Timberg, 2014). It means hackers, who have done this attack may have information about iPhone users such as a list of the contacts, emails and credit cards connected with ApplePay. Moreover, hackers may have access to user's photos, videos.


Internet in China looks different than this one we are used to. People are not allowed to access many websites such as Facebook or Twitter, because the Chinese government is censoring much information (Su and Shyong, 2019). Chinese people are using different software as well.
 

In this case study, I want to show, how lacks in Chinese software lacks in cybersecurity allow the hackers to attack iCloud, the service of Apple, one of the biggest IT company at the world. Secondly, I want to describe the method of attack, which was "man-in-the-middle" (Timberg, 2014).





References:

Su, A. and Shyong, F., 2019. The Chinese And Non-Chinese Internet Are Two Worlds. Here’S What It’S Like To Use Both. [online] Los Angeles Times. Available at: <https://www.latimes.com/world/la-fg-us-china-internet-split-20190603-story.html> [Accessed 3 December 2020].


Timberg, C., 2014. Apple’S Icloud Service Suffers Cyber-Attack In China, Putting Passwords In Peril. [online] The Washington Post. Available at: <https://www.washingtonpost.com/news/the-switch/wp/2014/10/21/apples-icloud-service-suffers-cyber-attack-in-china-putting-passwords-in-peril/> [Accessed 20 November 2020].

Comments

  1. Hi Daniel

    Good beginning
    we can still improve introduction by setting a scene and provide a bit further what to expect in case study to reader.

    Many thanks
    Chirag

    ReplyDelete

Post a Comment

Popular posts from this blog

SSL Asymmetric Encryption (Diagram 2)

Opinion about safety (Survey Analysis)

How Ransomware attack works? (Models & Methodologies)