Update: FBI probes AT&T's iPad 3G e-mail leaks
It's looking at whether a crime was committed
IDG News Service - The U.S. Federal Bureau of Investigation has opened an investigation into the leak of an estimated 114,000 Apple iPad user e-mail addresses.
Hackers belonging to a group called Goatse obtained the e-mail addresses after uncovering a Web application on AT&T's Web site that returned an iPad user's e-mail address when it was sent specially written queries. After writing an automated script to repeatedly query the site, they downloaded the addresses, and then handed them over to Gawker.com.
Now the FBI is trying to figure out whether this was a crime. "The FBI is aware of these possible computer intrusions and has opened an investigation into addressing the potential cyberthreat," said Lindsay Godwin, an FBI spokeswoman.
The investigation was opened Thursday by the FBI's Washington Field Office, she said. Godwin did not know if the investigation was opened at the request of Apple or AT&T. AT&T declined to comment, and Apple has not replied to requests for comment.
According to Gawker, Goatse hackers were able to download e-mail addresses belonging to White House Chief of Staff Rahm Emanuel, New York Mayor Michael Bloomberg and ABC News anchor Diane Sawyer. They also gained access to addresses belonging to employees of Google, Amazon, Microsoft and the U.S. military.
The hackers did this by guessing thousands of unique numbers -- called ICC-ID (Integrated Circuit Card Identifier) -- belonging to iPad users and feeding them into the AT&T Web site.
They wrote a PHP script that flooded AT&T's Web site with possible ICC-ID numbers and logged responses when the site returned an e-mail address. According to an interview with AT&T Chief Security Officer Ed Amoroso, the script exploited a feature on the Web site designed to auto-fill a login form with an e-mail address in order to speed things up when iPad 3G users went to view their AT&T accounts.
In a blog post Thursday, Goatse said that it did nothing illegal. The group obtained the the e-mail addresses via a public Web interface and then gave them to Gawker, but no one else, and has since destroyed the data, it said. "We did not contact AT&T directly, but we made sure that someone else tipped them off and waited for them to patch until we gave anything to Gawker. This is as 'nice guy' as it gets."
U.S. law prohibits the unauthorized accessing of computers, but it is unclear whether the script that the Goatse group used violated the law, said Jennifer Granick, civil liberties director with the Electronic Frontier Foundation. "The question is, when you do an automated test like this, [are you] getting any type of unauthorized access or not," she said.
If it turns out the data in question was not misused, it is unlikely that federal prosecutors will press charges, she added.
- Office for iPad apps ring up 27M downloads
- Apple plays hardball with iPad Mini reveal
- Apple breezes to PC sales' top spot as Windows share decays
- Analyst tallies perks of September launch of new iPhone, iPad
- Analyst predicts stellar iPad sales in next week's Apple earnings
- Nexus 7 holds up better than iPad in drop, water-dunk tests
- With iPad Mini, Apple would remain tablet king through '16, says IDC
- Apple demands ipad3.com domain
- Chrome for iOS snatches top spot on App Store
- iPad in the Enterprise: IT Must Stay Ahead of the Curve
- 5 eDiscovery Challenges Solved eDiscovery challenges continue to present themselves as data storage becomes more complex and grows the Big Data Era. Read this CommVault Solution Brief...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Cybersecurity Imperatives: Reinvent your Network Security The Rise of CyberSecurity
- Cybersecurity for Dummies eBook This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and...
- PST Archiving: What is it and How is it Done? Learn more about what PST data is, the risks relating to it, and how the new PST Archiving feature in the Simpana 10...
- HP DevOps KnowledgeVault This interactive resource focuses on the evolution taking place in the world of software development, specifically the Agile development framework, and the gap... All Macintosh White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!