{"id":2669,"date":"2020-06-08T08:08:50","date_gmt":"2020-06-08T06:08:50","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=2669"},"modified":"2023-08-16T14:59:41","modified_gmt":"2023-08-16T12:59:41","slug":"sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/","title":{"rendered":"Sign in with Apple got 0-day which allowed unauthorized access to third-party user accounts"},"content":{"rendered":"\n<p>Welcome to the next episode of the&nbsp;<a rel=\"noreferrer noopener\" target=\"_blank\" href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\">Xopero Security Center<\/a>!&nbsp;This week we look at a bug in Sign in with Apple service that could expose users to possible hacking and third-party account takeover. <\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"sign-in-with-apple-with-a-zeroday-that-could-have-given-attackers-unauthorized-access-to-user-accounts\"><strong>Sign in with Apple with a zero-day that could have given attackers unauthorized access to user accounts<\/strong><\/h2>\n\n\n<p>Who doesn\u2019t like a simple and seamless sign in \u2013 like Sign in with social media account or your Apple Face ID, Touch ID, or a device passcode option? Yes, fast and simple\u2026 Very nice. But the newly discovered bug could open users to the possibility that their third-party accounts would be completely hijacked.<\/p>\n\n\n\n<p><strong>Full account takeover<\/strong><\/p>\n\n\n\n<p>The issue has affected only third-party applications which were using Sign in with Apple and didn\u2019t implement their own additional security measures. The sign-in service, which works similarly to the OAuth 2.0 standard, logs in users by using either a JWT (JSON Web Token) or a code generated by an Apple server. In the latter case, the code is then used to generate a JWT. Apple gives users the option of sharing the Apple email ID with the third party or keeping the ID hidden. When users hide the ID, Apple creates a JWT that contains a user-specific relay ID.<\/p>\n\n\n\n<p>The worst-case scenario? The attacker could request JWTs for any Email ID from Apple and when the signature of these tokens was verified using Apple\u2019s public key, they showed as valid. Fortunately, it is already fixed &#8211; all thanks to the app developer Bhavuk Jain.<\/p>\n\n\n\n<p><a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/06\/apple-fixes-bug-that-could-have-given-hackers-unauthorized-to-user-accounts\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"got-any-vpn-configuration-update-requests-sent-by-your-it-department-proceed-with-caution-there-is-a-new-phishing-scam-in-the-wild\"><strong>Got any VPN configuration update requests sent by your IT department? Proceed with caution &#8211; there is a new phishing scam in the wild<\/strong><\/h2>\n\n\n<p>A new phishing campaign targets Microsoft Office 365 users who work remotely. Attackers try to coax them into updating the VPN configuration they use to access company assets while working from home.<\/p>\n\n\n\n<p>Statistics show that the new phishing scam so far landed in the inboxes of up to 15k targets. The attackers are spoofing the sender email address in the phishing emails to match the domains of their targets&#8217; organizations and embed hyperlinks that instead of directing the recipients to new VPN configs send them to phishing landing sites designed to steal their Office 365 credentials.<\/p>\n\n\n\n<p>The malicious landing page is a cloned Office 365 login page hosted on the Microsoft-owned web.core.windows.net domain. Are you asking yourself &#8211; how? Attackers abuse the Azure Blob Storage. And that is just the beginning, the page comes with a valid Microsoft certificate which makes it so much harder to detect the phishing attempt in time\u2026 or at all.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/office-365-phishing-baits-remote-workers-with-fake-vpn-configs\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"ebay-for-cybercriminals-revil-ransomware-operators-started-auctioning-victims-data\"><strong>eBay for cybercriminals &#8211; REvil ransomware operators started auctioning victims data<\/strong><\/h2>\n\n\n<p>COVID-19 made life harder for all of us. The economic slowdown caused by the virus is also hitting hard ransomware groups, and many have settled on different methods to increase payouts. Some are now doubly extorting targets &#8211; one payment for the encryption key and another one for a <em>promise<\/em> to permanently delete stolen data. There is also another way &#8211; hackers behind the REvil ransomware has begun auctioning off sensitive data stolen from targeted companies.<\/p>\n\n\n\n<p>Over the past few days, operators responsible for spreading the REvil ransomware&nbsp; (a.k.a. \u201cSodin\u201d and \u201cSodinokibi\u201c) used their Dark Web \u201cHappy Blog\u201d to announce its first ever stolen data auction. Criminals are selling files taken from a Canadian agricultural production company that has so far declined their extortion demands.<\/p>\n\n\n\n<p>They have set the minimum deposit at $5,000 in virtual currency, with the starting price of $50,000. What\u2019s to gain? A successful bidder will get three databases and more than 22,000 files stolen from the company.<\/p>\n\n\n\n<p><a href=\"https:\/\/krebsonsecurity.com\/2020\/06\/revil-ransomware-gang-starts-auctioning-victim-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"new-cold-boot-attack-affects-seven-years-of-lg-android-smartphones\"><strong>New cold boot attack affects seven years of LG Android smartphones<\/strong><\/h2>\n\n\n<p>LG has released a security update last month to fix a vulnerability that impacts its Android smartphones sold over the past seven years.&nbsp;<\/p>\n\n\n\n<p>The vulnerability CVE-2020-12753 impacts the bootloader component that ships with LG smartphones. Separate from the Android OS, the bootloader is a piece of firmware specific to each phone vendor. It is the first part of code that runs when a user starts the device, and it ensures that firmware and the Android OS itself start in a correct and secure manner. This bootloader component had been added to LG smartphones starting with the LG Nexus 5 series.<\/p>\n\n\n\n<p>US software engineer Max Thomas who discovered a vulnerability, says the bootloader component&#8217;s graphics package contains a bug that lets attackers sneak in their own code to run alongside the bootloader&#8217;s graphics under certain conditions, such as when the battery dies out and when the device is in the bootloader&#8217;s Download Mode.<\/p>\n\n\n\n<p>He says that threat actors who perfectly time an attack can gain the ability to run their own custom code, which could allow them to take over the bootloader, and inherently the entire device.&nbsp;<\/p>\n\n\n\n<p>The bug impacts all LG smartphones utilizing QSEE (Qualcomm Secure Execution Environment) chips that use the EL1 or EL3 runtime firmware, and all LG devices running Android 7.2 and later. To be clear, the CVE-2020-12753 vulnerability is what researchers call a &#8222;cold boot attack&#8221; meaning a vulnerability that can only be exploited by having physical access and connecting to a vulnerable device.<\/p>\n\n\n\n<p>LG has released a patch for this bug in the LVE-SMP-200006 security update in May.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/new-cold-boot-attack-affects-seven-years-of-lg-android-smartphones\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-gangs-team-up-to-form-extortion-cartel\"><strong>Ransomware gangs team up to form extortion cartel<\/strong><\/h2>\n\n\n<p>Maze ransomware operators have recently started to publish encrypted data of victims who refused to pay. They even launched a dedicated \u201cMaze news\u201d site. Soon after this tactic was quickly adopted by other groups, which now includes thirteen active ransomware operations known to leak stolen data if not paid.<\/p>\n\n\n\n<p><strong>Ransomware cartel formed. <\/strong>&nbsp;The Maze gang is once again stirring up the threat landscape by creating a cartel of ransomware operations to share resources and extort their victims. Last week on they added the information and files for an international architectural firm to their data leak site. What made this leak different was that the info was not from a Maze ransomware attack, but rather by another enterprise-targeting ransomware operation known as LockBit.<\/p>\n\n\n\n<p>Asked by Bleeping Computer, Maze operators operators confirmed that they are working with LockBit to share their experience and data leak platform. They also stated that another ransomware operation would be joining their collaborative group in the coming days.<\/p>\n\n\n\n<p>&#8222;Even more, they use not only our platform to post the data of companies, but also our experience and reputation, building the beneficial and solid future. We treat other groups as our partners, not as our competitors. Organizational questions is behind every successful business,&#8221; Maze told BleepingComputer.<\/p>\n\n\n\n<p>By joining forces to share advice, tactics, and a centralized data leak platform, ransomware operations can focus more on creating more sophisticated attacks and successful extortion attempts.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-gangs-team-up-to-form-extortion-cartel\/\" target=\"_blank\" rel=\"noreferrer noopener\">Read more<\/a><\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-6\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Apple Jailbreak Zero-Day Gets a Patch (<a href=\"https:\/\/threatpost.com\/apple-jailbreak-zero-day-patch\/156201\/\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatPost<\/a>)<br>2. Cisco warns: These Nexus switches have been hit by a serious security flaw (<a href=\"https:\/\/www.zdnet.com\/article\/cisco-warns-these-nexus-switches-have-been-hit-by-a-serious-security-flaw\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>3. Hacker posts database stolen from Dark Net free hosting provider DH (<a href=\"https:\/\/nakedsecurity.sophos.com\/2020\/06\/02\/hacker-posts-database-stolen-from-dark-net-free-hosting-provider-dh\/\" target=\"_blank\" rel=\"noreferrer noopener\">Naked Security<\/a>)<br>4. Octopus Scanner Sinks Tentacles into GitHub Repositories (<a href=\"https:\/\/threatpost.com\/octopus-scanner-tentacles-github-repositories\/156204\/\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatPost<\/a>)<br>5. VMware Cloud Director flaw lets hackers take over virtual datacenters (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/vmware-cloud-director-flaw-lets-hackers-take-over-virtual-datacenters\/\" target=\"_blank\" rel=\"noreferrer noopener\">BleepingComputer<\/a>)<br>6. Hackers hijack one of Coincheck&#8217;s domains for spear-phishing attacks (<a href=\"https:\/\/www.zdnet.com\/article\/hackers-hijack-one-of-coinchecks-domains-for-spear-phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>7. TrickBot Adds BazarBackdoor to Malware Arsenal (<a href=\"https:\/\/threatpost.com\/trickbot-bazarbackdoor-malware-arsenal\/156243\/\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatPost<\/a>)<br>8. Attackers tried to grab WordPress configuration files from over a million sites (<a href=\"https:\/\/www.helpnetsecurity.com\/2020\/06\/05\/wordpress-grab-configuration-files\/\" target=\"_blank\" rel=\"noreferrer noopener\">HelpNetSecurity<\/a>)<br>9. Mozilla fixes high\u2011risk Firefox flaws, bug in DoH feature (<a href=\"https:\/\/www.welivesecurity.com\/2020\/06\/04\/mozilla-fixes-five-high-risk-firefox-flaws-dns-over-https\/\" target=\"_blank\" rel=\"noreferrer noopener\">We Live Security<\/a>)<br>10. New 'Tycoon&#8217; Ransomware Strain Targets Windows, Linux (<a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/new-tycoon-ransomware-strain-targets-windows-linux\/d\/d-id\/1338006\" target=\"_blank\" rel=\"noreferrer noopener\">DarkReading<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the next episode of the&nbsp;Xopero Security Center!&nbsp;This week we look at a bug in Sign in with Apple service that could expose users to possible hacking and third-party account takeover.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-2669","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sign in with Apple got 0-day which allowed unauthorized access to third-party user accounts - Xopero Blog<\/title>\n<meta name=\"description\" content=\"This week we look at a bug in Sign in with Apple service that could expose users to possible hacking and third-party account takeover\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sign in with Apple got 0-day which allowed unauthorized access to third-party user accounts - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"This week we look at a bug in Sign in with Apple service that could expose users to possible hacking and third-party account takeover\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-08T06:08:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T12:59:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"Sign in with Apple got 0-day which allowed unauthorized access to third-party user accounts\",\"datePublished\":\"2020-06-08T06:08:50+00:00\",\"dateModified\":\"2023-08-16T12:59:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/\"},\"wordCount\":1270,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/\",\"name\":\"Sign in with Apple got 0-day which allowed unauthorized access to third-party user accounts - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-06-08T06:08:50+00:00\",\"dateModified\":\"2023-08-16T12:59:41+00:00\",\"description\":\"This week we look at a bug in Sign in with Apple service that could expose users to possible hacking and third-party account takeover\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sign in with Apple got 0-day which allowed unauthorized access to third-party user accounts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sign in with Apple got 0-day which allowed unauthorized access to third-party user accounts - Xopero Blog","description":"This week we look at a bug in Sign in with Apple service that could expose users to possible hacking and third-party account takeover","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/","og_locale":"pl_PL","og_type":"article","og_title":"Sign in with Apple got 0-day which allowed unauthorized access to third-party user accounts - Xopero Blog","og_description":"This week we look at a bug in Sign in with Apple service that could expose users to possible hacking and third-party account takeover","og_url":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-06-08T06:08:50+00:00","article_modified_time":"2023-08-16T12:59:41+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"Sign in with Apple got 0-day which allowed unauthorized access to third-party user accounts","datePublished":"2020-06-08T06:08:50+00:00","dateModified":"2023-08-16T12:59:41+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/"},"wordCount":1270,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/","url":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/","name":"Sign in with Apple got 0-day which allowed unauthorized access to third-party user accounts - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-06-08T06:08:50+00:00","dateModified":"2023-08-16T12:59:41+00:00","description":"This week we look at a bug in Sign in with Apple service that could expose users to possible hacking and third-party account takeover","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/sign-in-with-apple-got-0-day-which-allowed-unauthorized-access-to-third-party-user-accounts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"Sign in with Apple got 0-day which allowed unauthorized access to third-party user accounts"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=2669"}],"version-history":[{"count":9,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2669\/revisions"}],"predecessor-version":[{"id":5082,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/2669\/revisions\/5082"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=2669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=2669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=2669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}