© 2024 WYPR
WYPR 88.1 FM Baltimore WYPF 88.1 FM Frederick WYPO 106.9 FM Ocean City
Play Live Radio
Next Up:
0:00
0:00
0:00 0:00
Available On Air Stations
WYPO 106.9 Eastern Shore is off the air due to routine tower work being done daily from 8a-5p. We hope to restore full broadcast days by 12/15. All streams are operational

Cloud Data Security Concerns Raised After Reported Attack In China

A customer sets up her new iPhone 6 at an Apple store in Beijing on Friday. A group says the Chinese government backed an attack against users of Apple's iCloud service, but the government denies the claim.
Feng Li
/
Getty Images
A customer sets up her new iPhone 6 at an Apple store in Beijing on Friday. A group says the Chinese government backed an attack against users of Apple's iCloud service, but the government denies the claim.

Apple CEO Tim Cook on Wednesday spoke with officials in China about data security and privacy. This meeting comes on the heels of a reported attack against users of Apple's iCloud service in China. Hackers allegedly were able to get hold of users' data by intercepting traffic on the Internet. They did not break into Apple servers.

The attack coincided with the launch in China of the new iPhone 6. As for the perpetrator: A nonprofit watchdog called GreatFire.org alleges the Chinese government was behind it. China denies that. And Apple, in a statement, does not name a culprit.

The attack has a name: man in the middle.

"Imagine someone running a post office and they're managing all of the letters that go in and out of that post office," says Zackary Allen, lead researcher at the security firm ZeroFox. "A man-in the-middle attack is someone ... taking over one of those post offices. And they can take your envelopes that you're sending out to your family or your friends and put them somewhere else. ...

"Or they can open up the letter, change it, reseal it and then send it back out," he says.


And the sender wouldn't have a clue.

The end goal could be to steal information or to change information. The perpetrator could be one person or many people.

"We've seen criminal organizations; we've seen disgruntled employees. It can also be nation-state actors," Allen says.

The attack is really different from, say, a virus that gets into a single document. It's more sophisticated.

The Internet is a bunch of interconnected routers. With man in the middle, the attacker takes over a router and can watch all the traffic — text messages, emails, iCloud logins — to decide what's worth stealing.

"These routers help get you from where you are to a destination," Allen says. "If you manage to compromise one of those routers, any traffic that flows through that, you control."

Apple's new iPhone is in fact more secure than previous ones. The physical hardware itself is harder to hack into. So these kinds of attacks that target weak links in the transfer of data on the cloud will become more common, experts say.

Apple is advising concerned customers to read the warnings that pop up in Web browsers — so if you see a strange request for permission or a certificate at the iCloud login, don't just click OK.

Copyright 2021 NPR. To see more, visit https://www.npr.org.

Tags
Aarti Shahani is a correspondent for NPR. Based in Silicon Valley, she covers the biggest companies on earth. She is also an author. Her first book, Here We Are: American Dreams, American Nightmares (out Oct. 1, 2019), is about the extreme ups and downs her family encountered as immigrants in the U.S. Before journalism, Shahani was a community organizer in her native New York City, helping prisoners and families facing deportation. Even if it looks like she keeps changing careers, she's always doing the same thing: telling stories that matter.