iPad e-mail hackers defend attack as 'ethical'
Have not heard from FBI, which is investigating AT&T breach
Computerworld - The hackers who harvested an estimated 114,000 Apple iPad 3G owner e-mail addresses defended their actions Friday as "ethical" and said they did nothing illegal.
The hacking group Goatse Security obtained the e-mail addresses using an automated PHP script that collected iPad 3G owners' ICC-ID numbers and associated addresses from AT&T's servers using a publicly-available feature of the carrier's Web site.
"We believe what we did was ethical," said Goatse member Escher Auernheimer in a telephone interview today. "What we did was right."
Goatse waited until AT&T had closed the hole before revealing its findings, said Auernheimer, who defended the release as "responsible disclosure" -- the term given to security revelations made public only after a vendor has patched a bug or otherwise prevented a vulnerability. "We followed the disclosure process, which is more than you can say for at least a third of security researchers," he argued, referring to researchers who post bug details before a patch is available.
"It was in the public interest to have this disclosed," Auernheimer continued. "If someone had a Safari exploit for the iPad, for example, they could have gotten this information. It was in the public's and AT&T customers' interest [for the latter] to be able to mitigate this instantly."
Rather than contact AT&T directly with what they'd uncovered, Goatse tipped off an unnamed third party, who in turn reported the design flaw to AT&T. Goatse took that route, Auernheimer said, to prevent AT&T from preventing the group from publicizing the e-mail address exposure. "We didn't want an injunction [from AT&T] that would have kept us from disclosing the data. And we didn't see the necessity of contacting AT&T directly."
Goatse contacted several media outlets whose employees showed up on the list of e-mail addresses they'd obtained, including Fox News, Reuters and others. None responded to their messages.
Instead, Goatse contacted Gawker Media, the company that operates ValleyWag and other technology sites and blogs. "We gave the data only to Gawker," said Auernheimer "They were the only one willing to dedicate resources to [the story]." According to Auernheimer, Gawker assigned several interns to the task of pouring over the list of 114,000 e-mail addresses.
- Apple plays hardball with iPad Mini reveal
- Apple breezes to PC sales' top spot as Windows share decays
- Analyst tallies perks of September launch of new iPhone, iPad
- Analyst predicts stellar iPad sales in next week's Apple earnings
- Nexus 7 holds up better than iPad in drop, water-dunk tests
- With iPad Mini, Apple would remain tablet king through '16, says IDC
- Apple demands ipad3.com domain
- Chrome for iOS snatches top spot on App Store
- iPad in the Enterprise: IT Must Stay Ahead of the Curve
- Skepticism mounts over Windows RT's enterprise role
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts