{"id":16441,"date":"2013-07-29T12:05:08","date_gmt":"2013-07-29T19:05:08","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=16441"},"modified":"2013-07-29T12:05:08","modified_gmt":"2013-07-29T19:05:08","slug":"apple-and-viber-hacks-more-than-they-initially-appear","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/","title":{"rendered":"Apple and Viber Hacks \u2013 More Than They Initially Appear?"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hack.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-16493\" alt=\"Apple_and_Viber_hack\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hack.jpg\" width=\"600\" height=\"399\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hack.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hack-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hack-300x199.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>Last week, we discussed a couple of breaches that hit <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-developer-site-breached-researcher-takes-credit\/\" target=\"_blank\">Apple&#8217;s developer site<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/viber-swallowed-phish-not-tracking-users\/\" target=\"_blank\">Viber&#8217;s support site<\/a>. As it turns out, that wasn&#8217;t the last chapter in either story. This week brings additional information, showing that there was more going on than was initially apparent in both cases.<\/p>\n<p>On Monday last week, Apple announced that their developer site had been hacked several days earlier, and took down the site down until it could be securely restored. As of this morning, the Apple developer site is largely <a href=\"https:\/\/developer.apple.com\/support\/system-status\/\" target=\"_blank\">back up and running<\/a>, which is the good news. The disconcerting news is that the story of the hacker who took credit for the hack brings up more questions than answers.<\/p>\n<p>Clearly the Apple developer site had an issue that needed securing. The researcher seems to have found quite a few bugs in the site, and assumed that the bugs were the cause of the Apple Developer site needing to be secured. But are the two directly connected? Email addresses provided to <a href=\"http:\/\/m.guardiannews.com\/technology\/2013\/jul\/26\/apple-developer-site-hack\" target=\"_blank\">The Guardian<\/a> as proof appeared to be defunct or invalid. We may never know for certain.<\/p>\n<p>A couple of days later, Viber had their turn under the microscope as hackers defaced their support site. It turned out that <a href=\"https:\/\/www.intego.com\/mac-security-blog\/viber-swallowed-phish-not-tracking-users\/\">Viber employees had been phished<\/a>, which is what allowed the hackers in. But that wasn&#8217;t all they were able to access, and Viber had a rough weekend as a result. Twice, its App page was defaced with messages similar to the previous attack. They had apparently tried to <a href=\"http:\/\/www.techweekeurope.co.uk\/news\/viber-hacked-app-store-itunes-flaw-123191\" target=\"_blank\">revoke the hackers&#8217; access<\/a> to their\u00a0iTunes Connect account and it hadn&#8217;t worked, which is what allowed both App store attacks. If this is true, it&#8217;s something else Apple will need to secure in short order.<\/p>\n<p>In both cases, the attacks were more annoying than damaging. Minimal customer information was accessed, and both companies have worked quickly to fix the problems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week, we discussed a couple of breaches that hit Apple&#8217;s developer site and Viber&#8217;s support site. As it turns out, that wasn&#8217;t the last chapter in either story. This week brings additional information, showing that there was more going on than was initially apparent in both cases. On Monday last week, Apple announced that [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":16491,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,559,477,549],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Last week, we discussed a couple of breaches that hit Apple&#039;s developer site and Viber&#039;s support site. As it turns out, that wasn&#039;t the last chapter in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple and Viber Hacks \u2013 More Than They Initially Appear? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Last week, we discussed a couple of breaches that hit Apple&#039;s developer site and Viber&#039;s support site. As it turns out, that wasn&#039;t the last chapter in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-29T19:05:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"266\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg\",\"width\":400,\"height\":266,\"caption\":\"Hackers hit, leading to data breach - newspaper headline\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/\",\"name\":\"Apple and Viber Hacks \\u2013 More Than They Initially Appear? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#primaryimage\"},\"datePublished\":\"2013-07-29T19:05:08+00:00\",\"dateModified\":\"2013-07-29T19:05:08+00:00\",\"description\":\"Last week, we discussed a couple of breaches that hit Apple's developer site and Viber's support site. As it turns out, that wasn't the last chapter in\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple and Viber Hacks \\u2013 More Than They Initially Appear?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Apple and Viber Hacks \\u2013 More Than They Initially Appear?\",\"datePublished\":\"2013-07-29T19:05:08+00:00\",\"dateModified\":\"2013-07-29T19:05:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#webpage\"},\"wordCount\":324,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg\",\"keywords\":[\"Apple\",\"apple developer site\",\"Hackers\",\"Viber\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Last week, we discussed a couple of breaches that hit Apple's developer site and Viber's support site. As it turns out, that wasn't the last chapter in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/","og_locale":"en_US","og_type":"article","og_title":"Apple and Viber Hacks \u2013 More Than They Initially Appear? - The Mac Security Blog","og_description":"Last week, we discussed a couple of breaches that hit Apple's developer site and Viber's support site. As it turns out, that wasn't the last chapter in","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-07-29T19:05:08+00:00","og_image":[{"width":400,"height":266,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg","width":400,"height":266,"caption":"Hackers hit, leading to data breach - newspaper headline"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/","name":"Apple and Viber Hacks \u2013 More Than They Initially Appear? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#primaryimage"},"datePublished":"2013-07-29T19:05:08+00:00","dateModified":"2013-07-29T19:05:08+00:00","description":"Last week, we discussed a couple of breaches that hit Apple's developer site and Viber's support site. As it turns out, that wasn't the last chapter in","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple and Viber Hacks \u2013 More Than They Initially Appear?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Apple and Viber Hacks \u2013 More Than They Initially Appear?","datePublished":"2013-07-29T19:05:08+00:00","dateModified":"2013-07-29T19:05:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#webpage"},"wordCount":324,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg","keywords":["Apple","apple developer site","Hackers","Viber"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-and-viber-hacks-more-than-they-initially-appear\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/07\/Apple_and_Viber_hackFT.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4hb","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16441"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=16441"}],"version-history":[{"count":26,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16441\/revisions"}],"predecessor-version":[{"id":16497,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16441\/revisions\/16497"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/16491"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=16441"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=16441"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=16441"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}