Case Study (Method)

Greatfire.org, group of activists, which is monitoring Internet censorship in China reported the attack on 20 October 2014. One day later, hack has been confirmed by Apple (Timberg, 2014). Method used to hack was "man-in-the-middle" (Linshi, 2014). This method can work, when connection between user and service is not encrypted, which is common in China. Hacker can track data packages sent by user, which allows them to grab some information such as password and username (Nohe, 2018).

"Man-in-the-middle" scheme (thesslstore.com, 2018)


This hack starts a discussion about lacks in cybersecurity in China. GreatFire.org states that it was not their fault. Owner of the iCloud blamed Chinese government (Timberg, 2014). Moreover, the organisation mentioned, this attack can be organised by some Chinese authorities, regarding images and videos from Hong Kong protests (Augenbraun, 2014). However, the Chinese government denies responsibility for this hack (Timberg, 2014).



References

Augenbraun, E., 2014. Attack Reported On Apple Icloud In China. [online] Cbsnews.com. Available at: <https://www.cbsnews.com/news/attack-on-icloud-via-iphone-6-devices-sold-in-china/> [Accessed 4 December 2020].

Linshi, J., 2014. China Icloud Hack Is Latest State-Supported Attack, Report Says. [online] Time. Available at: <https://time.com/3529887/icloud-iphone-china-hack/> [Accessed 4 December 2020].


Nohe, P., 2018. Executing A Man-In-The-Middle Attack In Just 15 Minutes - Hashed Out. [online] Hashed Out by The SSL Store™. Available at: <https://www.thesslstore.com/blog/man-in-the-middle-attack-2/> [Accessed 3 December 2020].

Timberg, C., 2014. Apple’S Icloud Service Suffers Cyber-Attack In China, Putting Passwords In Peril. [online] The Washington Post. Available at: <https://www.washingtonpost.com/news/the-switch/wp/2014/10/21/apples-icloud-service-suffers-cyber-attack-in-china-putting-passwords-in-peril/> [Accessed 20 November 2020].
 

 



Comments

  1. Hi

    Appropriately following with Harvard style of reference list and in text citations.
    Please keep blogging and posting regularly.

    Many thanks
    Chirag

    ReplyDelete

Post a Comment

Popular posts from this blog

SSL Asymmetric Encryption (Diagram 2)

Opinion about safety (Survey Analysis)

How Ransomware attack works? (Models & Methodologies)