iPad e-mail hackers defend attack as 'ethical'
Have not heard from FBI, which is investigating AT&T breach
Computerworld - The hackers who harvested an estimated 114,000 Apple iPad 3G owner e-mail addresses defended their actions Friday as "ethical" and said they did nothing illegal.
The hacking group Goatse Security obtained the e-mail addresses using an automated PHP script that collected iPad 3G owners' ICC-ID numbers and associated addresses from AT&T's servers using a publicly-available feature of the carrier's Web site.
"We believe what we did was ethical," said Goatse member Escher Auernheimer in a telephone interview today. "What we did was right."
Goatse waited until AT&T had closed the hole before revealing its findings, said Auernheimer, who defended the release as "responsible disclosure" -- the term given to security revelations made public only after a vendor has patched a bug or otherwise prevented a vulnerability. "We followed the disclosure process, which is more than you can say for at least a third of security researchers," he argued, referring to researchers who post bug details before a patch is available.
"It was in the public interest to have this disclosed," Auernheimer continued. "If someone had a Safari exploit for the iPad, for example, they could have gotten this information. It was in the public's and AT&T customers' interest [for the latter] to be able to mitigate this instantly."
Rather than contact AT&T directly with what they'd uncovered, Goatse tipped off an unnamed third party, who in turn reported the design flaw to AT&T. Goatse took that route, Auernheimer said, to prevent AT&T from preventing the group from publicizing the e-mail address exposure. "We didn't want an injunction [from AT&T] that would have kept us from disclosing the data. And we didn't see the necessity of contacting AT&T directly."
Goatse contacted several media outlets whose employees showed up on the list of e-mail addresses they'd obtained, including Fox News, Reuters and others. None responded to their messages.
Instead, Goatse contacted Gawker Media, the company that operates ValleyWag and other technology sites and blogs. "We gave the data only to Gawker," said Auernheimer "They were the only one willing to dedicate resources to [the story]." According to Auernheimer, Gawker assigned several interns to the task of pouring over the list of 114,000 e-mail addresses.
- Office for iPad apps ring up 27M downloads
- Apple plays hardball with iPad Mini reveal
- Apple breezes to PC sales' top spot as Windows share decays
- Analyst tallies perks of September launch of new iPhone, iPad
- Analyst predicts stellar iPad sales in next week's Apple earnings
- Nexus 7 holds up better than iPad in drop, water-dunk tests
- With iPad Mini, Apple would remain tablet king through '16, says IDC
- Apple demands ipad3.com domain
- Chrome for iOS snatches top spot on App Store
- iPad in the Enterprise: IT Must Stay Ahead of the Curve
- Top 10 Reasons to Strengthen Information Security with Desktop Virtualization Regain control and reduce risk without sacrificing business productivity and growth
- Preventing Sophisticated Attacks: Anti-Evasion & Advanced Evasion Techniques McAfee Next Generation Firewall applies sophisticated analysis techniques specifically to detect advanced evasion techniques (AET).
- The Security Industry's Dirty Little Secret The debate over advanced evasion techniques (AETs) This report summarizes the findings of a McAfee commissioned research group to determine the level of understanding IT security professionals have about AETs...
- Demand More, Get the Most from the Move to a Next-Generation Firewall Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!