How Does An iCloud Hijack Work, Anyway?

Troy Hunt (of haveibeenpwned.com) on his personal blog:

I’ve been speaking to a bunch of people about this over the last couple of days about this attack so I thought I’d collate some info on how it works, what we know and what the possible sources of the attack may be.

An excellent summary of the iCloud hijacks, how they’ve been implemented, and smart analysis of where they could have originated from.

Troy is fast becoming one of my favourite writers on the topic of online security.

For the record, Apple responded yesterday stating iCloud was not compromised during these incidents.