{"id":17687,"date":"2020-05-31T14:22:00","date_gmt":"2020-05-31T14:22:00","guid":{"rendered":"https:\/\/icrowdnewswire.com\/?p=2575644"},"modified":"2020-05-31T14:22:00","modified_gmt":"2020-05-31T14:22:00","slug":"sign-in-with-apple-flaw-let-attackers-take-over-accounts","status":"publish","type":"post","link":"https:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/","title":{"rendered":"\u2018Sign in with Apple\u2019 flaw let attackers take over accounts"},"content":{"rendered":"<p><strong>Forged tokens would grant access to virtually any account.<\/strong><\/p>\n<p>&lsquo;<a href=\"https:\/\/www.engadget.com\/2019-06-03-apple-sign-in-privacy-wwdc.html\" data-rapid_p=\"1\" data-v9y=\"1\">Sign in with Apple<\/a>&rsquo; is potentially more private than other login options, but it apparently included a serious security flaw. Researcher Bhavuk Jain recently received a $100,000 bug bounty for&nbsp;<a href=\"https:\/\/bhavukjain.com\/blog\/2020\/05\/30\/zeroday-signin-with-apple\/\" target=\"_blank\" rel=\"noopener noreferrer\">discovering<\/a>&nbsp;(via&nbsp;<a href=\"https:\/\/thehackernews.com\/2020\/05\/sign-in-with-apple-hacking.html\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Hacker News<\/em><\/a>) a flaw in the sign-in service when available through third-party apps. If an app didn&rsquo;t have its own security measures, an attacker could forge a token linked to any email ID and verify it as &lsquo;valid&rsquo; using Apple&rsquo;s public key. That could allow a &ldquo;full account takeover&rdquo; even if you chose to hide your email from other services, Jain said.<\/p>\n<div id=\"engadget-post-contents\" class=\"o-article_block pb-15 pb-5@m- o-subtle_divider\" data-ylk=\"sec:postcontents;slk:%27Sign%20in%20with%20Apple%27%20flaw%20let%20attackers%20take%20over%20accounts;elm:link;itc:0;\">\n<div class=\"grid@tl+\">\n<div class=\"grid@tl+__cell col-8-of-12@tl+\">\n<div class=\"article-text c-gray-1\">\n<p>Jain found the flaw in April, and it&rsquo;s already fixed. Apple said there was no evidence of accounts being compromised as a result of the flaw.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div>\n<div class=\"o-article_block pb-15 pb-5@m- mt-n35 mt-n25@m mt-n15@s\">\n<div class=\"grid@tl+\">\n<div class=\"full-width@tp- grid@tl+__cell col-8-of-12@tl+\">\n<div class=\"article-text c-gray-1 no-review\">\n<p>There shouldn&rsquo;t have been any damage done as a result. Nonetheless, the bug probably isn&rsquo;t what Apple wanted to grapple with in the wake of a string of security issues, including an earlier&nbsp;<a href=\"https:\/\/www.engadget.com\/apple-ios-mail-app-malware-vulnerability-141636770.html\">Mail vulnerability<\/a>. It&rsquo;s fixing issues quickly &mdash; the question is whether or not it can cut down on these issues going forward.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p class=\"tags\">\n<div><strong>See Campaign: <\/strong><a href=\"https:\/\/bhavukjain.com\/blog\/2020\/05\/30\/zeroday-signin-with-apple\/\" target=\"_blank\">https:\/\/bhavukjain.com\/blog\/2020\/05\/30\/zeroday-signin-with-apple\/<\/a><br \/><b>Contact Information:<\/b><br \/>Jon Fingas<\/p>\n<p><b>Tags:<\/b><br \/><a href=\"\"><\/a>, <a href=\"https:\/\/icrowdnewswire.com\/category\/news-category\/wire\/\" rel=\"category tag\">Wire<\/a>, <a href=\"https:\/\/icrowdnewswire.com\/category\/global-regions\/united-states\/\" rel=\"category tag\">United States<\/a>, <a href=\"https:\/\/icrowdnewswire.com\/category\/language\/english\/\" rel=\"category tag\">English<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"\" alt=\"image\" width=\"400\" height=\"300\" class=\"cwdfimg\" \/><\/div>\n<div>\n<h3>Contact Information:<\/h3>\n<p>Jon Fingas<\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Forged tokens would grant access to virtually any account. &lsquo;Sign in with Apple&rsquo; is potentially more private than other login options, but it apparently included a serious security flaw. Researcher Bhavuk Jain recently received a $100,000 bug bounty for&nbsp;discovering&nbsp;(via&nbsp;Hacker News) a flaw in the sign-in service when available through third-party apps. If an app didn&rsquo;t &hellip; <a href=\"https:\/\/icrowdnewswire.com\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/\">Continue reading <span>&lsquo;Sign in with Apple&rsquo; flaw let attackers take over accounts<\/span><\/a> <a href=\"https:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/\" class=\"more-link\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":106,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,22,54],"tags":[],"class_list":["post-17687","post","type-post","status-publish","format-standard","hentry","category-english","category-united-states","category-wire"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u2018Sign in with Apple\u2019 flaw let attackers take over accounts - Business<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2018Sign in with Apple\u2019 flaw let attackers take over accounts - Business\" \/>\n<meta property=\"og:description\" content=\"Forged tokens would grant access to virtually any account. &lsquo;Sign in with Apple&rsquo; is potentially more private than other login options, but it apparently included a serious security flaw. Researcher Bhavuk Jain recently received a $100,000 bug bounty for&nbsp;discovering&nbsp;(via&nbsp;Hacker News) a flaw in the sign-in service when available through third-party apps. If an app didn&rsquo;t &hellip; Continue reading &lsquo;Sign in with Apple&rsquo; flaw let attackers take over accounts Continue Reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/\" \/>\n<meta property=\"og:site_name\" content=\"Business\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-31T14:22:00+00:00\" \/>\n<meta name=\"author\" content=\"Waqas Awan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Waqas Awan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/\",\"url\":\"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/\",\"name\":\"\u2018Sign in with Apple\u2019 flaw let attackers take over accounts - Business\",\"isPartOf\":{\"@id\":\"https:\/\/ipsnews.net\/business\/#website\"},\"datePublished\":\"2020-05-31T14:22:00+00:00\",\"author\":{\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/46e7a3c31ebaa3d111acaa0daf39976f\"},\"breadcrumb\":{\"@id\":\"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ipsnews.net\/business\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u2018Sign in with Apple\u2019 flaw let attackers take over accounts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ipsnews.net\/business\/#website\",\"url\":\"https:\/\/ipsnews.net\/business\/\",\"name\":\"Business\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ipsnews.net\/business\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/46e7a3c31ebaa3d111acaa0daf39976f\",\"name\":\"Waqas Awan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ipsnews.net\/business\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3453ff882f8bf8f7e605d09dc0750c5759cb895a2d09c18a38d07b424e7f6a29?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3453ff882f8bf8f7e605d09dc0750c5759cb895a2d09c18a38d07b424e7f6a29?s=96&d=mm&r=g\",\"caption\":\"Waqas Awan\"},\"sameAs\":[\"https:\/\/icrowdnewswire.com\/fc\"],\"url\":\"https:\/\/ipsnews.net\/business\/author\/waqas-awan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u2018Sign in with Apple\u2019 flaw let attackers take over accounts - Business","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/","og_locale":"en_US","og_type":"article","og_title":"\u2018Sign in with Apple\u2019 flaw let attackers take over accounts - Business","og_description":"Forged tokens would grant access to virtually any account. &lsquo;Sign in with Apple&rsquo; is potentially more private than other login options, but it apparently included a serious security flaw. Researcher Bhavuk Jain recently received a $100,000 bug bounty for&nbsp;discovering&nbsp;(via&nbsp;Hacker News) a flaw in the sign-in service when available through third-party apps. If an app didn&rsquo;t &hellip; Continue reading &lsquo;Sign in with Apple&rsquo; flaw let attackers take over accounts Continue Reading &rarr;","og_url":"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/","og_site_name":"Business","article_published_time":"2020-05-31T14:22:00+00:00","author":"Waqas Awan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Waqas Awan","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/","url":"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/","name":"\u2018Sign in with Apple\u2019 flaw let attackers take over accounts - Business","isPartOf":{"@id":"https:\/\/ipsnews.net\/business\/#website"},"datePublished":"2020-05-31T14:22:00+00:00","author":{"@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/46e7a3c31ebaa3d111acaa0daf39976f"},"breadcrumb":{"@id":"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/"]}]},{"@type":"BreadcrumbList","@id":"http:\/\/ipsnews.net\/business\/2020\/05\/31\/sign-in-with-apple-flaw-let-attackers-take-over-accounts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ipsnews.net\/business\/"},{"@type":"ListItem","position":2,"name":"\u2018Sign in with Apple\u2019 flaw let attackers take over accounts"}]},{"@type":"WebSite","@id":"https:\/\/ipsnews.net\/business\/#website","url":"https:\/\/ipsnews.net\/business\/","name":"Business","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ipsnews.net\/business\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/46e7a3c31ebaa3d111acaa0daf39976f","name":"Waqas Awan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ipsnews.net\/business\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3453ff882f8bf8f7e605d09dc0750c5759cb895a2d09c18a38d07b424e7f6a29?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3453ff882f8bf8f7e605d09dc0750c5759cb895a2d09c18a38d07b424e7f6a29?s=96&d=mm&r=g","caption":"Waqas Awan"},"sameAs":["https:\/\/icrowdnewswire.com\/fc"],"url":"https:\/\/ipsnews.net\/business\/author\/waqas-awan\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/17687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/users\/106"}],"replies":[{"embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/comments?post=17687"}],"version-history":[{"count":1,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/17687\/revisions"}],"predecessor-version":[{"id":17688,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/posts\/17687\/revisions\/17688"}],"wp:attachment":[{"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/media?parent=17687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/categories?post=17687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ipsnews.net\/business\/wp-json\/wp\/v2\/tags?post=17687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}