iPad e-mail hackers defend attack as 'ethical'
Have not heard from FBI, which is investigating AT&T breach
Computerworld - The hackers who harvested an estimated 114,000 Apple iPad 3G owner e-mail addresses defended their actions Friday as "ethical" and said they did nothing illegal.
The hacking group Goatse Security obtained the e-mail addresses using an automated PHP script that collected iPad 3G owners' ICC-ID numbers and associated addresses from AT&T's servers using a publicly-available feature of the carrier's Web site.
"We believe what we did was ethical," said Goatse member Escher Auernheimer in a telephone interview today. "What we did was right."
Goatse waited until AT&T had closed the hole before revealing its findings, said Auernheimer, who defended the release as "responsible disclosure" -- the term given to security revelations made public only after a vendor has patched a bug or otherwise prevented a vulnerability. "We followed the disclosure process, which is more than you can say for at least a third of security researchers," he argued, referring to researchers who post bug details before a patch is available.
"It was in the public interest to have this disclosed," Auernheimer continued. "If someone had a Safari exploit for the iPad, for example, they could have gotten this information. It was in the public's and AT&T customers' interest [for the latter] to be able to mitigate this instantly."
Rather than contact AT&T directly with what they'd uncovered, Goatse tipped off an unnamed third party, who in turn reported the design flaw to AT&T. Goatse took that route, Auernheimer said, to prevent AT&T from preventing the group from publicizing the e-mail address exposure. "We didn't want an injunction [from AT&T] that would have kept us from disclosing the data. And we didn't see the necessity of contacting AT&T directly."
Goatse contacted several media outlets whose employees showed up on the list of e-mail addresses they'd obtained, including Fox News, Reuters and others. None responded to their messages.
Instead, Goatse contacted Gawker Media, the company that operates ValleyWag and other technology sites and blogs. "We gave the data only to Gawker," said Auernheimer "They were the only one willing to dedicate resources to [the story]." According to Auernheimer, Gawker assigned several interns to the task of pouring over the list of 114,000 e-mail addresses.
- Apple plays hardball with iPad Mini reveal
- Apple breezes to PC sales' top spot as Windows share decays
- Analyst tallies perks of September launch of new iPhone, iPad
- Analyst predicts stellar iPad sales in next week's Apple earnings
- Nexus 7 holds up better than iPad in drop, water-dunk tests
- With iPad Mini, Apple would remain tablet king through '16, says IDC
- Apple demands ipad3.com domain
- Chrome for iOS snatches top spot on App Store
- iPad in the Enterprise: IT Must Stay Ahead of the Curve
- Skepticism mounts over Windows RT's enterprise role
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts