AT&T bug discloses 114,000 iPad owners' e-mail addresses
The issue, which affected only iPad 3G owners, was fixed on Tuesday
IDG News Service - A glitch in AT&T's Web site has exposed the e-mail addresses of more than 100,000 iPad buyers.
The data was downloaded by a hacking group known as Goatse Security, which obtained the information after stumbling upon a program on AT&T's Web site that would send back the iPad user's e-mail address when given a unique SIM card identification number known as an ICC-ID (Integrated Circuit Card Identifier).
By guessing ICC-ID numbers, the hackers were able to download 114,000 e-mail addresses, according to the Web site Gawker, which first reported the news on Wednesday.
"AT&T was informed by a business customer on Monday of the potential exposure of their iPad ICC-IDs," AT&T spokesman Mark Siegel said in an e-mail message on Wednesday. "This issue was escalated to the highest levels of the company and was corrected by Tuesday; and we have essentially turned off the feature that provided the e-mail addresses."
AT&T said the only information hackers could have obtained as a result of this bug was the e-mail address attached to the iPad. That data could have been misused by spammers.
AT&T plans to inform customers whose e-mail addresses were obtained, Siegel said. "At this point, there is no evidence that any other customer information was shared."
There are some pretty powerful iPad users out there, apparently.
After examining the hackers' data, Gawker found e-mail addresses belonging to White House Chief of Staff Rahm Emanuel, New York Mayor Michael Bloomberg and ABC News Anchor Diane Sawyer, as well as addresses belonging to Google, Amazon, Microsoft and the U.S. military.
"The person or group who discovered this gap did not contact AT&T," Siegel said.
Neither Apple nor Goatse Security responded to requests for comment.
The person or group who discovered the security gap did not contact AT&T.
"We are continuing to investigate and will inform all customers whose e-mail addresses and ICC IDS may have been obtained," AT&T said in its statement. "We take customer privacy very seriously and while we have fixed this problem, we apologize to our customers who were impacted."
Reports said the breach affected only iPad 3G owners. The iPad 3G went on sale April 30.
Computerworld's Ken Mingis contributed to this report.
- Office for iPad apps ring up 27M downloads
- Apple plays hardball with iPad Mini reveal
- Apple breezes to PC sales' top spot as Windows share decays
- Analyst tallies perks of September launch of new iPhone, iPad
- Analyst predicts stellar iPad sales in next week's Apple earnings
- Nexus 7 holds up better than iPad in drop, water-dunk tests
- With iPad Mini, Apple would remain tablet king through '16, says IDC
- Apple demands ipad3.com domain
- Chrome for iOS snatches top spot on App Store
- iPad in the Enterprise: IT Must Stay Ahead of the Curve
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Simplifying Product Design In A Complex World Product design engineering has moved far beyond the confines of ever-more powerful workstations. Companies can't afford to restrict projects to using only local...
- A Reference Architecture for the Internet of Things The aim of this is to provide Architects and Developers of IoT projects with an effective starting point that covers the major requirements...
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center...
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Hardware White Papers | Webcasts