Apple confirms hack of its developer website
Explains mysterious days-long outage, says names and email addresses may have been stolen
Computerworld - Apple on Sunday admitted that its developer website, which has been offline since Thursday, had been hacked. Some information may have been stolen, the company acknowledged.
In an email to developers, Apple said that intruders had broken into the site -- which is restricted to registered iOS and OS X developers -- last Thursday. Apple posted a similar message on the website.
All but the home page of the site has been offline since Thursday, and remained inaccessible Monday morning.
"An intruder attempted to secure personal information of our registered developers from our developer website," the email and on-site message read. "Sensitive personal information was encrypted and cannot be accessed, however, we have not been able to rule out the possibility that some developers' names, mailing addresses, and/or email addresses may have been accessed."
The Cupertino, Calif. company told developers that it was "completely overhauling" the site in response, and that it was updating the server software and rebuilding the developer database "to prevent a security threat like this from happening again."
Apple's portal lets developers access pre-release software, tools and documentation, and includes developer-only forums where they can exchange information and tips.
Speculation began Friday that the site had been hacked when the outage persisted and the company said nothing other than posting maintenance messages on the site. The fact that both iOS 7 and OS X Mavericks will ship within months, and thus that developers are in the midst of writing or rewriting apps to take advantage of new features, lent credence to the hacking theory, some said, because it would be the worst time for lengthy site maintenance.
"This is even feeling too long to be restoring from backups. The longer it goes, the more I believe the security-issue theory," Marco Arment, the creator of Instapaper, said on Twitter early Saturday.
Others have wondered whether digital certificates -- Apple issues them to developers to sign their apps -- may have been compromised, opening the window to hackers impersonating Apple or third-party software with malware of their own.
With the attack, Apple joins the long list of technology companies whose networks have been breached and customer information stolen by attackers, including Sony in 2011, Dropbox last year and Twitter in 2013.
Apple itself was victimized by hackers earlier this year. In February, the company confirmed that malware exploiting a Java vulnerability was used to compromise Macs inside the firm, presumably those of its own engineers as the attack originated from a hijacked website that catered to iOS developers.
On Sunday, Apple did not name a date when it expected to reopen the site.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is firstname.lastname@example.org.
- Apple unveils minor bumps to MacBook Pro laptops
- Feds arrest Florida man who allegedly conned Apple out of $309K
- Yosemite's traffic share triples after public beta debuts
- Apple hasn't exhausted its supply of Yosemite betas
- 13 pieces of advice for Yosemite beta testers
- The other Apple economy: $2B in devices on eBay
- Apple sends users scrambling for OS X Yosemite
- Long replacement cycle drags down iPad sales
- Apple unwraps OS X Yosemite public beta Thursday
- Apple grows Mac sales by 18% on the back of the MacBook Air
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Cybercrime and Hacking White Papers | Webcasts