Reuters reports that Apple has announced, in "an unprecedented admission of a widespread cyber-security breach," that its network was attacked by the same hackers who targeted Facebook. "No data appeared to have been stolen." Facebook disclosed on Friday that hackers traced to China "staged a sophisticated attack by infiltrating its employees' laptops, but no user information was compromised."

18 Responses to “Apple: We were hit by China hackers who targeted Facebook last week”

  1. theophrastvs says:

    ..and cue China’s response:  you lie! we did no such thing!  and besides, you do it too.

    (the latter being true. maybe. probably.)

  2. Cowicide says:

    This and other highly publicized hacks seem to be happening almost as if it was all on cue. No data is stolen, but they are getting compromised.  /tinfoil hat

  3. Hegelian says:

    “no user information was compromised.”

    …as Chinese hackers quickly realized that they could access Users compromising data by simply using the Facebook Social Graph search feature…

  4. timquinn says:

    The hack is coming FROM INSIDE YOUR OWN COMPUTER!!!!1!!1

  5. Beryllium9 says:

    Apparently the system ate my other comment. Anyway.

    The uptick in hacking incidents in December and January spurred me to create a ranking system for cyber attack severity. For example, I rated the Facebook incident as a “Level 2 Attack” on a scale that goes up to Level 7 (“Skynet” :) ). Because this Apple incident is related to the Facebook one, it seems to show a degree of coordination, so I’ve actually rated it as a “Level 3″ attack – the same level as the Bit9 penetration and the Federal Reserve data heist. I am amused by Cowicide and That_Anonymous_Coward’s suggestion that it’s a false flag operation to ramrod a bill through Congress, but stranger things have happened.

    By way of contrast, I rated the Burger King and Jeep twitter account hacks as mere Level One “Events”.

    I’ve open-sourced the overview (“the rules”) on my Github account, as well, so I’m hoping that it can be collaboratively refined into a firm methodology for classifying these attacks.

    • Cowicide says:

      I am amused by Cowicide and That_Anonymous_Coward’s suggestion that it’s a false flag operation to ramrod a bill through Congress, but stranger things have happened.

      Indeed, there has been.

      [cow jumps back into lead bunker]

    • That_Anonymous_Coward says:

      What was your rating of the “Russian CyberAttack” on that valve in the water treatment plant that was used to cause all kinds of hysteria in the public about hackers destroying things in the real world from cyberspace.
      They can destroy our water supply…

      or we could actually investigate and discover it was the contractor accessing the system to fix something they asked him to fix.

      Paypal told the world the hackers never touched them, in the complaints used to arrest the skiddies it was a massive attack that costed them kajillions of dollars.

      Sony claimed their network was secure, over and over and over and over and over… well we know how that worked out.

      Corporations ALWAYS NOTORIOUSLY deny any problems, and now you have a long series of open and honest communication.  That seems about as likely as FB introducing a clear, concise, easily accessible privacy control panel.

      While there might be actual hacking by the “bad guys” going on out there, the timing of the incidents with pending bills is to be suspect.  Remember the leaders always want to suggest terrorism at the first time of a problem.

      And let us not forget in the digital pearl harbor level of events… we fired first and now are bitching about others are doing the same to us.

      • Beryllium9 says:

        It’s still a work in progress. I might have time one day to go back and rank such classic attacks as the ones you’ve mentioned.

        Not to mention the original allegations against Kevin Mitnick. *whistles*

  6. Sarah Smith says:

    Where is McCain when we need him?

Leave a Reply