Update: FBI probes AT&T's iPad 3G e-mail leaks
It's looking at whether a crime was committed
IDG News Service - The U.S. Federal Bureau of Investigation has opened an investigation into the leak of an estimated 114,000 Apple iPad user e-mail addresses.
Hackers belonging to a group called Goatse obtained the e-mail addresses after uncovering a Web application on AT&T's Web site that returned an iPad user's e-mail address when it was sent specially written queries. After writing an automated script to repeatedly query the site, they downloaded the addresses, and then handed them over to Gawker.com.
Now the FBI is trying to figure out whether this was a crime. "The FBI is aware of these possible computer intrusions and has opened an investigation into addressing the potential cyberthreat," said Lindsay Godwin, an FBI spokeswoman.
The investigation was opened Thursday by the FBI's Washington Field Office, she said. Godwin did not know if the investigation was opened at the request of Apple or AT&T. AT&T declined to comment, and Apple has not replied to requests for comment.
According to Gawker, Goatse hackers were able to download e-mail addresses belonging to White House Chief of Staff Rahm Emanuel, New York Mayor Michael Bloomberg and ABC News anchor Diane Sawyer. They also gained access to addresses belonging to employees of Google, Amazon, Microsoft and the U.S. military.
The hackers did this by guessing thousands of unique numbers -- called ICC-ID (Integrated Circuit Card Identifier) -- belonging to iPad users and feeding them into the AT&T Web site.
They wrote a PHP script that flooded AT&T's Web site with possible ICC-ID numbers and logged responses when the site returned an e-mail address. According to an interview with AT&T Chief Security Officer Ed Amoroso, the script exploited a feature on the Web site designed to auto-fill a login form with an e-mail address in order to speed things up when iPad 3G users went to view their AT&T accounts.
In a blog post Thursday, Goatse said that it did nothing illegal. The group obtained the the e-mail addresses via a public Web interface and then gave them to Gawker, but no one else, and has since destroyed the data, it said. "We did not contact AT&T directly, but we made sure that someone else tipped them off and waited for them to patch until we gave anything to Gawker. This is as 'nice guy' as it gets."
U.S. law prohibits the unauthorized accessing of computers, but it is unclear whether the script that the Goatse group used violated the law, said Jennifer Granick, civil liberties director with the Electronic Frontier Foundation. "The question is, when you do an automated test like this, [are you] getting any type of unauthorized access or not," she said.
If it turns out the data in question was not misused, it is unlikely that federal prosecutors will press charges, she added.
- Office for iPad apps ring up 27M downloads
- Apple plays hardball with iPad Mini reveal
- Apple breezes to PC sales' top spot as Windows share decays
- Analyst tallies perks of September launch of new iPhone, iPad
- Analyst predicts stellar iPad sales in next week's Apple earnings
- Nexus 7 holds up better than iPad in drop, water-dunk tests
- With iPad Mini, Apple would remain tablet king through '16, says IDC
- Apple demands ipad3.com domain
- Chrome for iOS snatches top spot on App Store
- iPad in the Enterprise: IT Must Stay Ahead of the Curve
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Macintosh White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!