Lucian Constantin
CSO Senior Writer

Apple blocks tool that brute-forces iCloud passwords

news
Jan 8, 20152 mins

The tool allowed attackers to try a large number of passwords for Apple ID accounts

Apple has fixed an issue that could have allowed attackers to launch brute-force attacks against iCloud users in order to guess their passwords.

The problem came to light after a proof-of-concept attack tool called iDict was released on GitHub in early January.

Developed by a user who uses the online alias Pr0x13, the tool was described as “100% Working iCloud Apple ID Dictionary attack that bypasses Account Lockout restrictions and Secondary Authentication on any account.”

It worked by trying out a large number of passwords for the targeted Apple IDs. By default the tool came with a file — also called a dictionary — containing 500 commonly used passwords, but the list could have easily been extended.

Online services like iCloud typically limit the number of failed log-in attempts per account in order to prevent brute-force attacks, but Pr0x13 allegedly found a way to bypass those protections.

Pr0x13 claims that he made iDict public in order to draw attention to the problem and force Apple to fix it. “This bug is painfully obvious and was only a matter of time before it was privately used for malicious or nefarious activities,” he said in the tool’s description.

Apple was relatively quick to act and started enforcing rate limiting for log-in attempts done with iDict a day after the tool became available.

“iDict is patched,” Pr0x13 said on Twitter. “Discontinue its use if you don’t want to lock your account.”

This attack comes after the iCloud accounts of several celebrities including Jennifer Lawrence, Kate Upton and Kirsten Dunst were compromised and private photos were stolen from them in September.

The company said at the time that the compromises were the result of a targeted attack on user names, passwords and security questions. Following the incident Apple implemented two-factor authentication for iCloud accounts. Users are advised to turn on the feature.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author