• Please be sure to read the rules and adhere to them. Some banned members have complained that they are not spammers. But they spammed us. Some even tried to redirect our members to other forums. Duh. Be smart. Read the rules and adhere to them and we will all get along just fine. Cheers. :beer: Link to the rules: https://www.forumsforums.com/threads/forum-rules-info.2974/

iPad Security Issue, 100,000+ owners data compromised

Melensdad

Jerk in a Hawaiian Shirt & SNOWCAT Moderator
Staff member
GOLD Site Supporter
This is bad news for Apple. As the iPad, iPod/Touch and iPhone use the same basic core operating system, I have to wonder if there are not other security issues yet to be announced?

http://gawker.com/5559346/

Apple's Worst Security Breach: 114,000 iPad Owners Exposed

Apple has suffered another embarrassment. A security breach has exposed iPad owners including dozens of CEOs, military officials, and top politicians. They—and every other buyer of the wireless-enabled tablet—could be vulnerable to spam marketing and malicious hacking.
500x_ipadfrontnew.jpg
The breach, which comes just weeks after an Apple employee lost an iPhone prototype in a bar, exposed the most exclusive email list on the planet, a collection of early-adopter iPad 3G subscribers that includes thousands of A-listers in finance, politics and media, from New York Times Co. CEO Janet Robinson to Diane Sawyer of ABC News to film mogul Harvey Weinstein to Mayor Michael Bloomberg. It even appears that White House Chief of Staff Rahm Emanuel's information was compromised.

It doesn't stop there. According to the data we were given by the web security group that exploited vulnerabilities on the AT&T network, we believe 114,000 user accounts have been compromised, although it's possible that confidential information about every iPad 3G owner in the U.S. has been exposed. We contacted Apple for comment but have yet to hear back. We also reached out to AT&T for comment. A call to Rahm Emanuel's office at the White House has not be returned.

500x_ileak_inside1.jpg

The specific information exposed in the breach included subscribers' email addresses, coupled with an associated ID used to authenticate the subscriber on AT&T's network, known as the ICC-ID. ICC-ID stands for integrated circuit card identifier and is used to identify the SIM cards that associate a mobile device with a particular subscriber.

AT&T closed the security hole in recent days, but the victims have been unaware, until now. For a device that has been shipping for barely two months, and in its cellular configuration for barely one, the compromise is a rattling development. The slip up appears to be AT&T's fault at the moment, and it will complicate the company's already fraught relationship with Apple. But it will also likely unnerve customers thinking of buying iPads that connect to AT&T's cellular network.

It will also do so at a pivotal moment, with the iPad 3G early in its sales cycle. Brisk sales for the original wi-fi iPad had promised to turn the 3G model into a similar profit machine. But further questions about AT&T, already widely ridiculed for its bad service, are going to make people think twice about spending up to $830 and $25 per month on the iPad 3G.

Breach details: Who did it, and how
The subscriber data was obtained by a group calling itself Goatse Security. Though the group is steeped in off-the-wall, 4chan-style internet culture—its name is a reference to a famous gross-out Web picture—it has previously highlighted real security vulnerabilities in the Firefox and Safari Web browsers, and attracted media attention for finding what it said were flaws in Amazon's community ratings system.

Goatse Security obtained its data through a script on AT&T's website, accessible to anyone on the internet. When provided with an ICC-ID as part of an HTTP request, the script would return the associated email address, in what was apparently intended to be an AJAX-style response within a Web application. The security researchers were able to guess a large swath of ICC IDs by looking at known iPad 3G ICC IDs, some of which are shown in pictures posted by gadget enthusiasts to Flickr and other internet sites, and which can also be obtained through friendly associates who own iPads and are willing to share their information, available within the iPad "Settings" application.

To make AT&T's servers respond, the security group merely had to send an iPad-style "User agent" header in their Web request. Such headers identify users' browser types to websites.

The group wrote a PHP script to automate the harvesting of data. Since a member of the group tells us the script was shared with third-parties prior to AT&T closing the security hole, it's not known exactly whose hands the exploit fell into and what those people did with the names they obtained. A member tells us it's likely many accounts beyond the 114,000 have been compromised.

Goatse Security notified AT&T of the breach and the security hole was closed.

We were able to establish the authenticity of Goatse Security's data through two people who were listed among the 114,000 names. We sent these people the ICC ID contained in the document—and associated with the person's iPad 3G account—and asked them to verify in an iPad control panel that this was the correct ICC ID. It was.

Victims: Some big names
Then we began poring through the 114,067 entries and were stunned at the names we found. The iPad 3G, released less than two months ago, has clearly been snapped up by an elite array of early adopters.

Within the military, we saw several devices registered to the domain of DARPA, the advanced research division of the Department of Defense, along with the major service branches. To wit: One affected individual was William Eldredge, who "commands the largest operational B-1 [strategic bomber] group in the U.S. Air Force."

500x_ileak_inside2.jpg

In the media and entertainment industries, affected accounts belonged to top executives at the New York Times Company, Dow Jones, Condé Nast, Viacom, Time Warner, News Corporation, HBO and Hearst.

500x_ileakinside3.jpg

Within the tech industry, accounts were compromised at Google, Amazon, Microsoft and AOL, among others. In finance, accounts belonged to companies from Goldman Sachs to JP Morgan to Citigroup to Morgan Stanley, along with dozens of venture capital and private equity firms.

In government, affected accounts included a GMail user who appears to be Rahm Emanuel and staffers in the Senate, House of Representatives, Department of Justice, NASA, Department of Homeland Security, FAA, FCC, and National Institute of Health, among others. Dozens of employees of the federal court system also appeared on the list.

Ramifications
There are no doubt other high-profile subscribers caught up in the security lapse, along with ordinary users who now have reason to worry that AT&T might expose more of their iPad data to hackers.

At the very least, AT&T exposed a very large and valuable cache of email addresses, VIP and otherwise. This is going to hurt the telecommunications company's already poor image with iPhone and iPad customers, and complicate its very profitable relationship with Apple. Exacerbating the situation is that AT&T has not yet notified customers of the breach, judging from the subscribers we and the security group contacted, despite being itself notified at least two days ago. It's unclear if AT&T has notified Apple of the breach.

Then there's the question of whether any damage can be done using the ICC IDs. The Goatse Security member who contacted us was concerned that recent holes discovered in the GSM cell phone standard mean that it might be possible to spoof a device on the network or even intercept traffic using the ICC ID. Two other security experts we contacted were less confident in that assessment. Mobile security consultant and Nokia veteran Emmanuel Gadaix told us that while there have been "vulnerabilities in GSM crypto discovered over the years, none of them involve the ICC ID... as far as I know, there are no vulnerability or exploit methods involving the ICC ID."

Another expert, white hat GSM hacker and University of Virginia computer science PhD Karsten Nohl, told us that while text-message and voice security in mobile phones is weak "data connections are typically well encrypted... the disclosure of the ICC-ID has no direct security consequences."

But that didn't mean he thinks AT&T is off the hook:
It's horrendous how customer data, specifically e-mail addresses, are negligently leaked by a large telco provider.​
We suspect many AT&T customers will agree.
 

tsaw

New member
GOLD Site Supporter
I just read about that on another site - and you should see how in the comments, the Apple fans were blaming AT&T. Since Apple has locked the users in with AT&T.. Don't Steve and company bare some responsibility? I thinks so.
 

Melensdad

Jerk in a Hawaiian Shirt & SNOWCAT Moderator
Staff member
GOLD Site Supporter
Looks like the breach was more of a phone service provider issue than an Apple issue, but that still doesn't seem like a good thing!

From the Wall Street Journal: http://online.wsj.com/article/SB100...10807737710.html?mod=WSJ_hpp_MIDDLETopStories
AT&T Discloses Breach of iPad Owner Data
By SPENCER E. ANTE

AT&T Inc. acknowledged Wednesday that a security hole in its website had exposed iPad users' email addresses, a breach that highlights how corporations still have problems protecting private information.

A small group of computer experts that calls itself Goatse Security claimed responsibility for the intrusion, saying the group had exploited an opening in AT&T's website to find numbers that identify iPads connected to AT&T's mobile network.

Those numbers allowed the group to uncover 114,000 email addresses of thousands of iPad customers, including prominent officials in companies, politics and the military, the group said. Gawker Media LLC reported the breach Wednesday. It doesn't appear any financial or billing information was made public.

AT&T, the sole U.S. provider of wireless service for the Apple Inc. tablets, said it had fixed the security problem by Tuesday. It said it would inform all customers whose email addresses and iPad IDs may have been obtained. Apple didn't reply to requests for comment.

"At this point, there is no evidence that any other customer information was shared," AT&T said. "We take customer privacy very seriously, and while we have fixed this problem, we apologize to our customers who were impacted."

AT&T sells cellular connections to iPad users on a monthly basis. Ed Amoroso, chief security officer at AT&T, said the hole grew out of an effort by the carrier to make it easier for customers to renew subscriptions.

Customers gave AT&T their emails when they signed up for cellular service. The carrier then pre-entered those email addresses in a field on its website as a convenience so customers wouldn't have to retype it when they renewed, Mr. Amoroso said.

"We are trying to make it a convenient arrangement for customers," he said. "If we could have done it over we would not have pre-populated."

The nine-person group said it discovered the flaw about a month ago while trying to figure out how the iPad operated. It said it disclosed the vulnerability several weeks ago in an Internet chat room. A few days ago, its members decided to hack AT&T's website.

It was able to obtain thousands of email addresses, including those apparently belonging to White House Chief of Staff Rahm Emanuel, New York Major Michael Bloomberg and U.S. Air Force Colonel William Eldridge. A spokesman for Mr. Bloomberg declined to comment. Mr. Emanuel and Col. Eldridge couldn't immediately be reached.

The Department of Defense doesn't publish the emails of military officials to the public, a spokesman said.

The group said it contacted AT&T and verified the hole was closed before it disclosed the breach to the public. AT&T said it was contacted by a business customer, not the people who discovered the security flaw.​
 
Top