Subscribe free to our newsletters via your
. GPS News .




CYBER WARS
Hackers claim 12 million Apple IDs from FBI
by Staff Writers
Washington (AFP) Sept 4, 2012


A hacker group has claimed to have obtained personal data from 12 million Apple iPhone and iPad users by breaching an FBI computer, raising concerns about government tracking, but the FBI said it never had the data.

The group called AntiSec, linked to the hacking collective known as Anonymous, posted one million Apple user identifiers on Monday purported to be part of a larger group of 12 million obtained from an FBI laptop.

The FBI initially had no comment on the reports, but later in the day issued a statement which cast doubt on the purported data breach, saying it never had the data in question.

"The FBI is aware of published reports alleging that an FBI laptop was compromised and private data regarding Apple UDIDs (unique device identifiers) was exposed," the US Federal Bureau of Investigation said in a statement.

"At this time, there is no evidence indicating that an FBI laptop was compromised or that the FBI either sought or obtained this data."

A tweet from the FBI press office said: "We never had info in question. Bottom Line: TOTALLY FALSE."

Peter Kruse, an e-crime specialist with CSIS Security Group in Denmark, said on Twitter that the leak "is real" and that he confirmed three of his own devices in the leaked data.

"Also notice that they claim to have fullname, addresses, phone numbers etc... Big ouch!" he tweeted.

Apple did not immediately respond to a request for comment.

The fact that some user data was breached prompted a flurry of comments, some suggesting that the government or Apple was implicated in a vast invasion of user privacy.

Aldo Cortesi, a security consultant living in New Zealand, called the incident "a privacy catastrophe."

"The vulnerabilities ranged from de-anonymization, to takeover of the user's gaming social network account, to the ability to completely take over the user's Facebook and Twitter accounts," he said on a blog posting.

One website set up a database to help users determine if their device was on the hacked list of Apple unique device IDs (UDIDs).

Johannes Ullrich of the SANS Internet Storm Center said it was difficult to verify the report.

"There is nothing else in the file that would implicate the FBI. So this data may very well come from another source. But it is not clear who would have a file like this," he told AFP.

Ullrich said it is unclear why the FBI, if the report were true, would have the data.

"The size of the file... would imply a widespread, not a targeted tracking operation, or the file was just kept in case any of the users in the file needs to be tracked," he said.

"The significance of this breach very much hinges on the source, which as far as I know, hasn't been authenticated yet. The data is, however, real based on some of the reports that people do find their own UDID in the file."

In the posting, AntiSec said the original file "contained around 12,000,000 devices" and that "we decided a million would be enough to release."

The group said it "trimmed out other personal data such as full names, cell numbers, addresses, zipcodes, etc."

It said it posted the information to draw attention to Apple's practices, which allow users to be tracked.

"We never liked the concept of UDIDs since the beginning indeed. Really bad decision from Apple," it said.

It added "we have learnt it seems quite clear nobody pays attention if you just come and say 'hey, FBI is using your device details...' FBI IS USING YOUR DEVICE INFO FOR A TRACKING PEOPLE PROJECT OR SOME S---."

The document posted on the website pastebin indicated that the data was obtained in March from the computer of an FBI Cyber Action supervisor through a "vulnerability" in the computer.

Eric Hemmendinger, a security expert with Tata Communications, said that if an FBI computer from a cybersecurity investigator was hacked, it would be "a pretty embarrassing scenario."

Hemmendinger said the FBI's possession of the data would be surprising, but that it should not be a surprise that Apple and its rivals would have detailed information on its users.

"This is yet another indicator that when you start to participate in social networking and applications that Apple and (Google's) Android have propagated, you are the asset that's being leveraged and monetized," he said.

"It's yet another reminder that when you join the social network world, your footprints are not private."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Taiwan to step up cyberwar capabilities: report
Taipei (AFP) Sept 2, 2012
Taiwan plans to beef up its cyberwar capabilities to counter a perceived threat from Chinese hackers targeting government and security websites, local media reported Sunday. Taiwan will expand its cyberwar units next year while scaling back military spending due to budget constraints, the Taipei-based Liberty Times reported, citing a 2013 budget plan submitted by the National Security Bureau ... read more


CYBER WARS
Discovery may help protect crops from stressors

Uncoiling the cucumber's enigma

Brazil's Rousseff vows to stand firm on environment defense

World can increase food supply, study says

CYBER WARS
More than 70 percent of electronic waste management is uncontrolled

Researchers measure photonic interactions at the atomic level

Wayne State's new flexible electronics technology may lead to new medical uses

Magnetic Vortex Reveals Key to Spintronic Speed Limit

CYBER WARS
Arrest after China flight threat: state media

Airbus says Chinese-built planes to be sold only in China

Australia buys Growler systems for Hornets

Boeing to Provide PBL for USAF F-15 Radars

CYBER WARS
US auto sales jump 20 percent in August

New Saab cars to be rolled out in 2014

China's Dongfeng sees profits slide in first half

Ford says it will bring luxury car brand to China

CYBER WARS
Chinese 'blind spot' for Western readers

Finland seeks new cleantech for shipping

Growth in Chinese overseas investment slows

China firms to invest $8.6 bln in Indonesia smelters

CYBER WARS
Liberia forests sold off in secret logging contracts: report

Natural Regeneration Building Urban Forests, Altering Species Composition

Myanmar in deforestation crisis

Widespread local extinctions in tropical forest 'remnants'

CYBER WARS
Suomi NPP Captures Smoke Plume Images from Russian and African Fires

Remote Sensing Satellite Sends First Earth Imagery

Proba-2's espresso-cup microcamera snaps Hurricane Isaac

$3.7 Billion Reasons Why GIS Technology is The Future

CYBER WARS
Researchers Develop New, Less Expensive Nanolithography Technique

Breakthrough in nanotechnology material science

Nano machine shop shapes nanowires, ultrathin films

New wave of technologies possible after ground-breaking analysis tool developed




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement