Subscribe free to our newsletters via your
. Space Industry and Business News .




CYBER WARS
Hackers claim 12 million Apple IDs from FBI
by Staff Writers
Washington (AFP) Sept 4, 2012


A hacker group has claimed to have obtained personal data from 12 million Apple iPhone and iPad users by breaching an FBI computer, raising concerns about government tracking, but the FBI said it never had the data.

The group called AntiSec, linked to the hacking collective known as Anonymous, posted one million Apple user identifiers on Monday purported to be part of a larger group of 12 million obtained from an FBI laptop.

The FBI initially had no comment on the reports, but later in the day issued a statement which cast doubt on the purported data breach, saying it never had the data in question.

"The FBI is aware of published reports alleging that an FBI laptop was compromised and private data regarding Apple UDIDs (unique device identifiers) was exposed," the US Federal Bureau of Investigation said in a statement.

"At this time, there is no evidence indicating that an FBI laptop was compromised or that the FBI either sought or obtained this data."

A tweet from the FBI press office said: "We never had info in question. Bottom Line: TOTALLY FALSE."

Peter Kruse, an e-crime specialist with CSIS Security Group in Denmark, said on Twitter that the leak "is real" and that he confirmed three of his own devices in the leaked data.

"Also notice that they claim to have fullname, addresses, phone numbers etc... Big ouch!" he tweeted.

Apple did not immediately respond to a request for comment.

The fact that some user data was breached prompted a flurry of comments, some suggesting that the government or Apple was implicated in a vast invasion of user privacy.

Aldo Cortesi, a security consultant living in New Zealand, called the incident "a privacy catastrophe."

"The vulnerabilities ranged from de-anonymization, to takeover of the user's gaming social network account, to the ability to completely take over the user's Facebook and Twitter accounts," he said on a blog posting.

One website set up a database to help users determine if their device was on the hacked list of Apple unique device IDs (UDIDs).

Johannes Ullrich of the SANS Internet Storm Center said it was difficult to verify the report.

"There is nothing else in the file that would implicate the FBI. So this data may very well come from another source. But it is not clear who would have a file like this," he told AFP.

Ullrich said it is unclear why the FBI, if the report were true, would have the data.

"The size of the file... would imply a widespread, not a targeted tracking operation, or the file was just kept in case any of the users in the file needs to be tracked," he said.

"The significance of this breach very much hinges on the source, which as far as I know, hasn't been authenticated yet. The data is, however, real based on some of the reports that people do find their own UDID in the file."

In the posting, AntiSec said the original file "contained around 12,000,000 devices" and that "we decided a million would be enough to release."

The group said it "trimmed out other personal data such as full names, cell numbers, addresses, zipcodes, etc."

It said it posted the information to draw attention to Apple's practices, which allow users to be tracked.

"We never liked the concept of UDIDs since the beginning indeed. Really bad decision from Apple," it said.

It added "we have learnt it seems quite clear nobody pays attention if you just come and say 'hey, FBI is using your device details...' FBI IS USING YOUR DEVICE INFO FOR A TRACKING PEOPLE PROJECT OR SOME S---."

The document posted on the website pastebin indicated that the data was obtained in March from the computer of an FBI Cyber Action supervisor through a "vulnerability" in the computer.

Eric Hemmendinger, a security expert with Tata Communications, said that if an FBI computer from a cybersecurity investigator was hacked, it would be "a pretty embarrassing scenario."

Hemmendinger said the FBI's possession of the data would be surprising, but that it should not be a surprise that Apple and its rivals would have detailed information on its users.

"This is yet another indicator that when you start to participate in social networking and applications that Apple and (Google's) Android have propagated, you are the asset that's being leveraged and monetized," he said.

"It's yet another reminder that when you join the social network world, your footprints are not private."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Taiwan to step up cyberwar capabilities: report
Taipei (AFP) Sept 2, 2012
Taiwan plans to beef up its cyberwar capabilities to counter a perceived threat from Chinese hackers targeting government and security websites, local media reported Sunday. Taiwan will expand its cyberwar units next year while scaling back military spending due to budget constraints, the Taipei-based Liberty Times reported, citing a 2013 budget plan submitted by the National Security Bureau ... read more


CYBER WARS
Russia unveils own 'almost Android' system

China's Baidu to invest $1.6 bn in cloud computing

Samsung violates Chinese workers' rights: report

Apple event invites hint at iPhone 5 debut

CYBER WARS
Smartphone App Can Track Objects On the Battlefield as Well as On the Sports Field

Lockheed Martin Wins Role on Defense Information Systems Agency Program

Raytheon unveils cross domain strategy to securely access information via mobile devices

NATO Special Forces Taps Mutualink for Global Cross Coalition Communications

CYBER WARS
First-Stage Fuel Loaded; Launch Weather Forecast Improves

NASA launches mission to explore radiation belts

ISRO to score 100 with a cooperative mission Sep 9

NASA Administrator Announces New Commercial Crew And Cargo Milestones

CYBER WARS
CTrack Launches Lone Worker Device To Boost Protection And Peace Of Mind

Spirent Redefines Leadership in Location Testing with Solution for Hybrid Location Technology

Robbers nabbed thanks to GPS phone in loot

Fourth Galileo satellite reaches French Guiana launch site

CYBER WARS
Arrest after China flight threat: state media

Airbus says Chinese-built planes to be sold only in China

Australia buys Growler systems for Hornets

Boeing to Provide PBL for USAF F-15 Radars

CYBER WARS
More than 70 percent of electronic waste management is uncontrolled

Researchers measure photonic interactions at the atomic level

Wayne State's new flexible electronics technology may lead to new medical uses

Magnetic Vortex Reveals Key to Spintronic Speed Limit

CYBER WARS
Suomi NPP Captures Smoke Plume Images from Russian and African Fires

Remote Sensing Satellite Sends First Earth Imagery

Proba-2's espresso-cup microcamera snaps Hurricane Isaac

$3.7 Billion Reasons Why GIS Technology is The Future

CYBER WARS
Philippine gold mine struggles to plug waste spill

Oil spilling from Turkish bulk carrier wreck off Cape Town

Wind concentrates pollutants with unexpected order in an urban environment

China wrestles with acid rain threat




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement