Hackers leak 1 million Apple device IDs
There may also be an additional 11 million Apple device IDs yet to be released, many with users' full names, addresses and telephone numbers attached.
"Why exposing [sic] this personal data?" asked the unnamed writer of the Pastebin posting announcing the data dump, who claimed to be affiliated with the anti-government hacktivist group AntiSec. "Well, we have learnt it seems quite clear nobody pays attention if you just come and say 'Hey, FBI is using your device details and info and who the [expletive] knows what the hell are they experimenting with that,' well sorry, but nobody will care."
Users of the 1 million affected devices are, for the moment, probably not in any danger of identity theft or account takeovers. However, they may want to know why the FBI apparently had their device IDs on file.
Apple unique device identification numbers (UDIDs) establish a single iOS device's identity in the Apple ecosystem, letting iTunes and app developers know which device is running what.
UDIDs are what lock most iOS devices into installing only software from the iTunes App Store, and what let game developers keep track of each user's high score.
The 88-megabyte file posted by AntiSec on several file-sharing sites is heavily encrypted, but the Pastebin posting offers detailed instructions for decrypting it using open-source software.
To check whether your iPhone, iPad or iPod Touch's UDID might be among those affected, a software developer based in Florida has already posted a tool at http://kimosabe.net/test.html.
Apple UDIDs can be found by plugging an iOS device into a computer, opening iTunes and clicking on the device serial number displayed.
Mac-centric website MacOS Rumors has verified that many of the UDIDs in the data dump are genuine, but notes that "UDIDs themselves are rather harmless in isolation."
However, New Zealand-based security researcher Aldo Cortesi has shown that thanks to disregard of Apple's security guidelines by iOS game and app developers, it's possible to determine a user's identity through an UDID alone.
Hacker counterintelligence
The Pastebin post claims that the UDIDs were stolen thanks to an Anonymous hack into the laptop of FBI agent Christopher Stangl, a member of a New York-based cybercrime task force.
Stangl has spoken publicly on matters of cybersecurity, appearing in February 2011 on a panel discussion on cybercrime attended by SecurityNewsDaily. Two years earlier, he starred in a FBI recruitment video posted on Facebook.
Stangl was also among 44 American and European law-enforcement personnel copied on an email, sent in January 2012, inviting recipients to join a conference call to discuss efforts against the hacktivist groups Anonymous and LulzSec.
Anonymous intercepted the email and used it to eavesdrop on and record the conference call, which they then posted online in February 2012.
According to yesterday's Pastebin post, hackers used a then-new Java exploit to get into Stangl's machine.
"During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java," the posting states. "During the shell session some files were downloaded from his Desktop folder one of them with the name of 'NCFTA_iOS_devices_intel.csv' turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts."
"No other file on the same folder makes mention about this list or its purpose," adds the writer of the Pastebin post.
"CSV" is the Windows filetype associated with a list of comma-separated values, which separate database entries with a comma and can be read by Microsoft Excel and many other applications.
"NFCTA" may refer to the National Cyber-Forensics & Training Alliance, a Pittsburgh-based non-profit organization that, in its own words, "functions as a conduit between private industry and law enforcement with a core mission to identify, mitigate and neutralize cybercrime."
It is not clear why an FBI agent would have a database of 12.4 million iOS device UDIDs on his laptop, nor why the NFCTA would have provided them to him.
Requests for comment by SecurityNewsDaily to Apple and the NFCTA were not immediately returned. An FBI spokeswoman said the bureau was aware of the reports but had no further comment.
Sprechen Sie Deutsch?
In a blog posting this morning, Errata Security CEO Robert Graham theorizes that the hackers may have used the intercepted FBI email to " spear phish " the email's recipients, luring them to a rigged website that would have loaded the brand-new, or "zero-day," Java exploit onto their machines.
"If I have an email list of victims, and a new [zero]-day appears, I'm immediately going to phish with it," wrote Graham. "It's not Chinese uber APT [advanced persistent threat] hackers, it's just monkeys mindless[ly] following a script."
Graham Cluley, a security researcher with the British firm Sophos, pointed out today that the Pastebin writer may be a native German speaker thanks to an impolite message in German to Mitt Romney at the end of the post. The stilted English grammar, frequent use of the preposition "so" to begin sentences, a reference to Austrian banks and a Goethe quotation also indicate a German-language connection.
As might be expected, the writer makes shout-outs to Anonymous, WikiLeaks, the Syrian rebels and the imprisoned Russian punk band Pussy Riot, and criticizes National Security Agency head Gen. Keith Alexander's appeal in July to hackers to join the government.
But the writer also cites Jack Henry Abbott, the prison-based writer who was paroled in 1981 thanks to the efforts of famed author Norman Mailer. Abbott killed another man six weeks into his parole and spent the rest of his life in prison.
The writer also uses the Latin phrase "argumentum ad baculum," or "appeal to the stick," the proposition that arguments, however flawed, can be won through use of force.
In a dig at the press, the writer also demands that Adrian Chen, a technology reporter at the gossip blog Gawker who has written extensively on Anonymous, humiliate himself on camera.
"No more interviews to anyone till Adrian Chen get featured in the front page of Gawker, a whole day, with a huge picture of him dressing a ballet tutu and shoe on the head," the posting says. "No Photoshop."
Update 1:30 p.m. ET, Sept. 4: A law enforcement official who spoke to NBC News on condition of anonymity said that there is no evidence the FBI ever requested the Apple data through the legal process. It’s believed to be likely a hoax designed to infect other users because of malware in the posting. No evidence, so far, of any FBI computers being compromised, though that is still being checked.
Posted:
Source: http://www.nbcnews.com/technology/technolog/hackers-leak-1-million-apple-device-ids-977988
Related Articles
Comments
GoldenDiamondsPosted:
Why the hell do the FBI have this, they have no right... I guess i shall change my password
Activez-Posted:
Took awhile to read but very informative.
Wonder why an agent of the FBI would need over 1 million UDIDs.
Wonder why an agent of the FBI would need over 1 million UDIDs.
TheyPosted:
Long read.
OT, I wonder if it's just a hoax or if the FBI actually has the UDIDs.
I just hope if they did get stolen from the FBI, I hope my UDID isn't one of them.
OT, I wonder if it's just a hoax or if the FBI actually has the UDIDs.
I just hope if they did get stolen from the FBI, I hope my UDID isn't one of them.
theartftwPosted:
Let's try to make more interesting posts guys. "lol", provides nothing.
As for the topic on hand, makes you wonder what exactly they had planned with the information..
As for the topic on hand, makes you wonder what exactly they had planned with the information..
Latest Downloads
- 01. Cabela's Dangerous Hunts 2011 SPECIAL EDITION(0)
- 02. Hellgate: London - SaveGame (completed to boss Berial)(0)
- 03. S.T.A.L.K.E.R. 2: Heart of Chornobyl - SaveGame (Before the final quests)(5)
- 04. EU - Digimon Survive (CUSA18242)(1)
- 05. Callisto Protocol - NG+ Hardcore File Save(0)
- 06. Goat Simulator 3: SaveGame (Save with full walkthrough and all items)(2)
- 07. S.T.A.L.K.E.R. 2: Heart of Chornobyl - SaveGame (before choosing between a varta and a monolith)(7)
- 08. Rock Band 3 99% Save Wii(0)
- 09. Dead Rising 2: Off the Record - SaveGame (50 lvl, 5.000.000$, S/A)(0)
- 10. Need for Speed: Undercover - Save Game (4th level of the racer)(0)
- 11. [EU] F.I.S.T.: Forged in Shadow Torch (CUSA28371)(11)
- 12. Ghost Exile: SaveGame (Level 50 with 30,000 money)(2)
- 13. S.T.A.L.K.E.R. 2: Heart of Chornobyl - SaveGame (progress from the Dump to the Boat)(12)
- 14. Cyberpunk 2077: Phantom Liberty - SaveGame (The areas have been cleared.(9)
- 15. Red Dead Redemption 2: Save Game (Chapters 3,4,5 with all bags)(7)
Latest Tutorials
- 01. PS3 HEN - Audio via a USB headset.(609)
- 02. Stumble Guys | Social Butterfly Achievement(335)
- 03. Last Days of Lazarus Achievement Walkthrough (Xbox/PS)(1,646)
- 04. EDENGATE: The Edge of Life - 100% Trophy/Achievement Guide(2,066)
- 05. Sherlock Holmes Chapter One | Walkthrough | No Commentary(1,668)
- 06. Morbid: The Seven Acolytes | Full Game Walkthrough(2,747)
- 07. Adam Wolfe | Full Game Walkthrough | No Commentary(1,804)
- 08. ALFRED HITCHCOCK: VERTIGO - 100% Walkthrough(2,187)
- 09. SHERLOCK HOLMES THE AWAKENED | Walkthrough | No Commentary(1,541)
- 10. Space Roguelike Adventure | Guide - Cheat Code!(1,767)
- 11. DETECTIVE Stella Porta Case | Trophy & Achievement Guide(1,324)
- 12. Tunic 100% Platinum Walkthrough | Trophy & Achievement Guide(2,030)
- 13. Outbreak: The Nightmare Chronicles Achievement Walkthrough(1,635)
- 14. Full Void 100% - Trophy & Achievement Guide(1,676)
- 15. Outbreak: Lost Hope #Xbox Achievement Walkthrough(2,453)
"Hackers leak 1 million Apple device IDs" :: Login/Create an Account :: 51 comments