18 Jul 2013

Apple Developer Portal down for 8 straight days

Posted by iwgcr

When Apple’s developer site went down on Thursday  July 18, the company put up a short notice saying that maintenance work was taking place. However, after 24 hours, the site was still offline, leading some to believe that it was more than just a bit of routine tinkering taking place. And they were right.

Three days after the site went down, and with developers becoming increasingly concerned about the reasons for the outage, Apple sent out an email explaining that, in fact, the site had suffered a security breach.

The message  – also posted on the Member Center webpage where developers usually log in – said “an intruder” had entered the site last week in an attempt to steal personal data from registered developers. While Apple was certain in the belief that sensitive personal information of registered developers had not been accessed, it said it could not “rule out the possibility that some developers’ names, mailing addresses, and/or email addresses may have been accessed.”

At around 7PM EST on the eighth day of the outage, Apple released the following update:

“We appreciate your patience as we work to bring our developer services back online. Certificates, Identifiers & Profiles, software downloads, and other developer services are now available. If you would like to know the availability of a particular system, visit our status page.

If your program membership expired or is set to expire during this downtime, it will be extended and your app will remain on the App Store. If you have any other concerns about your account, please contact us.

Thank you for bearing with us while we bring these important systems back online. We will continue to update you on our progress. 

Date

Service

Duration

Critical Data Lost

2013-7-18

Apple Services

7 days 19 hours

unkown

 

Reference:

http://www.digitaltrends.com/apple/apple-admits-its-developer-site-was-hacked/

http://news.cnet.com/8301-13579_3-57599443-37/apple-dev-site-hack-linked-to-remote-code-vulnerability/

 

Tags: