Apple Inc was recently attacked by hackers who infected Macintosh computers of some employees, the company said Tuesday in an unprecedented disclosure describing the widest known cyber attacks targeting Apple computers used by corporations.
Unknown hackers infected the computers of some Apple workers when they visited a website for software developers that had been infected with malicious software. The malware had been designed to attack Mac computers.
The same software, which infected Macs by exploiting a flaw in a version of Oracle Corp’s Java software used as a plug-in on Web browsers, was used to launch attacks against Facebook, which the social network disclosed on Friday.
The malware was also employed in attacks against Mac computers used by “other companies,” Apple said, without elaborating on the scale of the assault.
Twitter, which disclosed that it had been breached February 1 and that hackers might gave accessed some information on about 250,000 users, was hit in the same campaign, according to a person close to the investigation.
Another person briefed on the case said that hundreds of companies, including defense contractors, had been infected with the same malicious software. Though this person said that the malware could have originated from China, there was no proof.
“This is a new campaign. It’s not like the other ones you read about where everyone can tell it’s China,” the first person said.
Investigations into the breaches are ongoing. It was not immediately clear when the attacks had begun, the extent to which the hackers had succeeded in stealing data from targeted systems, or whether all infected machines have been identified.
The malware was distributed at least in part through a site aimed at iPhone developers, which might still be infecting visitors who haven’t disabled Java in their browser, the person close to the case said. There is a version that infects computers running Microsoft Windows as well.
Security firm F-Secure wrote that the attackers might have been trying to get access to the code for apps on smartphones, seeking a way to infect millions of end-users. It urged developers to check their source code for unintended changes.
Apple disclosed the breach as tensions are heating up over U.S. allegations that the Chinese military engages in cyber espionage on U.S. companies.
U.S. cyber security firm Mandiant reported over the weekend that it has uncovered evidence that the Chinese military is behind a slew of cyber attacks on U.S. businesses. The White House said it has repeatedly raised concerns about Chinese cyber theft with Beijing.
The breaches described by Apple mark the highest-profile cyber attacks to date on businesses running Mac computers. Hackers have traditionally focused on attacking machines running the Windows operating system, though they have gradually turned their attention to Apple products over the past couple of years as the company gained market share over Microsoft Corp.
“This is the first really big attack on Macs,” said the source, who declined to be identified because the person was not authorized to discuss the matter publicly. “Apple has more on its hands than the attack on itself.”
Charlie Miller, a prominent expert on Apple security who is co-author of the Mac Hacker’s Handbook, said the attacks show that criminal hackers are investing more time studying the Mac OS X operating system so they can attack Apple computers.
For example, he noted, hackers recently figured out a fairly sophisticated way to attack Macs by exploiting a flaw in Adobe Systems Inc’s Flash software.
“The only thing that was making it safe before is that nobody bothered to attack it. That goes away if somebody bothers to attack it,” Miller said.
Cyber security attacks have been on the rise. In last week’s State of the Union address, U.S. President Barack Obama issued an executive order seeking better protection of the country’s critical infrastructure from cyber attacks.
White House spokesman Jay Carney told reporters on Tuesday that the Obama administration has repeatedly taken up its concerns about Chinese cyber theft with Beijing, including the country’s military. There was no indication as to whether the group described by Mandiant was involved in the attacks described by Apple and Facebook.
An Apple spokesman declined to specify how many companies had been breached in the campaign targeting Macs, saying he could not elaborate further on the statement it provided.
“Apple has identified malware which infected a limited number of Mac systems through a vulnerability in the Java plug-in for browsers. The malware was employed in an attack against Apple and other companies, and was spread through a website for software developers,” the statement said.
“We identified a small number of systems within Apple that were infected and isolated them from our network. There is no evidence that any data left Apple,” it continued.
The statement said Apple was working closely with law enforcement to find the culprits, but the spokesman would not elaborate. The Federal Bureau of Investigation declined to comment.
Apple said it plans to release a piece of software on Tuesday that customers can use to identify and repair Macs infected with the malware used in the attacks.
Cyber threat continues: Mystery hackers hijack Jeep’s Twitter feed after Burger King coup
Hackers took over Chrysler’s Jeep Twitter account on Tuesday, sending out colorful tweets disparaging the off-road vehicle and company management just a day after Burger King’s feed was similarly hijacked.
The unidentified cyber-attackers replaced Jeep’s logo with Cadillac’s and suggested Chrysler’s iconic group had been sold to the General Motors Co luxury brand, forcing Cadillac to clarify that it had nothing to do with the hack on its own Twitter feed.
“The official Twitter handle for the Jeep – Just Empty Every Pocket. Sold to Cadillac … In a hood near you!” read the tagline on Jeep’s Twitter page.
“Sorry guys … no more Jeep production because we caught our CEO doing this,” read one tweet that linked to a picture of a man inhaling on what appeared to be a bong.
A Cadillac spokesman in Detroit said the brand had no official comment, other than to observe there was “some Twitter mischief going on.”
Ignite Social Media, the North Carolina-based agency that manages Twitter and other social media accounts for most of Chrysler’s brands in North America, noticed the first unauthorized tweet on Jeep’s site at 1:32 p.m. ET Tuesday, according to Ed Garsten, head of Chrysler digital media.
“They immediately contacted Twitter to start the process to regain control of the account,” Garsten said, adding that the account was back under Chrysler’s control in less than an hour.
“The agency and the company are looking at strengthening security on the site,” said Garsten. This would include stronger passwords and other measures.
“We have no idea who did it. I understand Twitter was especially prepared to deal with today’s situation because they just went through the process with Burger King.”
Hackers breached the Twitter account of fast-food chain Burger King Worldwide Inc on Sunday, posting the online equivalent of graffiti and forcing its suspension for about an hour. The hackers also claimed the hamburger chain had been sold to arch-rival McDonald’s Corp.
Other companies took advantage of the attention surrounding the Twitter hackings to promote their own brands.
Viacom Inc’s MTV sent out a message that it also had been hacked on its official Twitter account with more than 6.6 million followers. But it was just a prank, which was confirmed on Twitter on Tuesday afternoon. BET, also owned by Viacom, pulled a similar stunt.
Twitter, which industry experts say has a poor track record on online security and reliability, has over the past year begun courting big corporate sponsors, hoping to beef up its revenue stream as it competes for Web surfers with Google Inc and Facebook Inc .
Industry analysts have urged the company for years to beef up online security by adopting “two-factor authentication” or encrypting its website, among other measures.
This month, anonymous hackers broke into Twitter and possibly gained access to passwords and other information for as many as 250,000 user accounts.
“Twitter is like Facebook in that it started as a way of sharing thoughts and friendships, and security seems to be the antithesis of sharing. After all, how much damage can a little 140-character message do?” said Murray Jennex, a cyber-security expert at San Diego State University.
“That said, when business saw an opportunity to do business using Twitter, that risk assessment went away and, at that point, Twitter should have implemented a SecureID or two-factor authentication login.”