Feeds

Bloke raises hand in vid, claims: I sparked Apple dev site hack panic

'I have 100,000+ users' details ... please don't blacklist me'

Using blade systems to cut costs and sharpen efficiencies

A Turkish security bod calling himself Ibrahim Balic claims his bug reports to Apple sparked the shutdown of Cupertino's Developer Centre website.

The iPhone giant pulled the plug on its online home for app programmers last Thursday fearing someone was attempting to hacking into its databases.

Now Balic has alleged he found 13 security vulnerabilities in the system and exploited them to pull up information on 73 Apple staff. He also claimed he gained access to more than 100,000 developers' private data. But he insists he did this to demonstrate the apparent flaws - reported via bugreport.apple.com - and uploaded a video to protest his innocence (since removed).

In an extended mea culpa written after the initial media storm over the Developer Centre outage, the London-based researcher huffed: "I'm not feeling very happy with what I read and I'm a bit irritated, as I did not do this research [to cause] harm or damage.

"I didn't attempt to publish or share this situation with anybody else. My aim was to report bugs and collect the data for the purpose of seeing how deep I can go within this scope. I have over 100,000 users' details and Apple is informed about this. I didn't attempt to get the data first and report then, instead I have reported first."

Balic claims the developer website was shutdown just four hours after he contacted Apple; he added that the fondleslab titan did not respond to his bug reports. The Reg cannot confirm his allegations, and Apple has not yet commented on Balic's claims.

He added: "I do not want my name to be on a blacklist. I'm keeping all the evidence, emails and images. Also I have the records of the bugs that I made through Apple's bug-report [system]."

Security market expert Graham Cluley has predicted that Apple may be tempted to take tough action to dissuade any other researchers from probing too hard.

He wrote: "Balic may not have been motivated by malice if he did, as appears to be the case, exploit a security hole in Apple’s Developer Centre. But he clearly was operating without Apple’s permission.

"As such, the extracting of developers’ personal data from the site could be argued to be unauthorised access, and Apple could – if it wanted – pursue legal action against the researcher.

"Whether Apple will choose to pursue legal action in this case remains to be seen. Although it may be bad for its brand image to pursue a researcher who doesn’t appear to have had cybercrime in mind, Apple is a very strange company. Who can forget when Apple encouraged police to look into the loss of its iPhone prototype in a bar, which resulted in the editor of Gizmodo having his house raided?"

"Apple is under new management now, but the possibility remains that it may want to make an example of him," he added. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.