Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

Hackers Claim FBI Had 12 Million Apple UDIDs

A hacker group has claimed to have obtained personal data from 12 million Apple iPhone and iPad users by breaching an FBI computer, raising concerns about government tracking.

The group called AntiSec, linked to the hacking collective known as Anonymous, posted one million Apple user identifiers claimed to be part of a larger group of 12 million, purportedly obtained from an FBI laptop.

A hacker group has claimed to have obtained personal data from 12 million Apple iPhone and iPad users by breaching an FBI computer, raising concerns about government tracking.

The group called AntiSec, linked to the hacking collective known as Anonymous, posted one million Apple user identifiers claimed to be part of a larger group of 12 million, purportedly obtained from an FBI laptop.

Contacted by AFP, FBI spokeswoman Jenny Shearer said: “We’re not commenting.”

Peter Kruse, an ecrime specialist with CSIS Security Group in Denmark, said on Twitter that the leak “is real” and that he confirmed three of his own devices in the leaked data.

“Also notice that they claim to have fullname, adresses, phone numbers etc… Big ouch!” he tweeted.

Eric Hemmendinger, a security expert with Tata Communications, said the report raises concerns about the protectors of cybersecurity.

“The question is not whether it’s accurate, it is why did the feds have the information and why did they not take due care to secure it,” he told AFP.

Hemmendinger said that based on past reports from Anonymous and related groups, he believes the report is probably true.

Advertisement. Scroll to continue reading.

“If you work in cybersecurity and your machine gets hacked, that’s a pretty embarrassing scenario,” he said.

Apple did not immediately respond to a request for comment.

Social media and news blogs were aflutter with the news. The tech blog Geekosystem called it “one of the worst privacy disasters yet” and various Twitter comments said the news suggested the FBI is tracking Apple users.

One website set up a database to help users determine if their device was on the hacked list of Apple unique device IDs (UDIDs).

“Quite why the FBI was collecting the UDIDs and personal information of millions of iPhone and iPad users is not yet clear — but it’s obvious that the data (and the computer it was apparently stored on) was not adequately secured,” said Graham Cluley of the British security firm Sophos.

“My suspicion is that the hackers were more interested in embarrassing the FBI’s team than endangering innocent users. All the same, hacking into computers is a criminal act — and I would anticipate that the FBI and other law enforcement agencies will be keen to hunt down those responsible.”

Others expressed concern about the apparent leak.

“Since UDIDs are unique to each iPhone and iPad, having yours end up in the wrong hands is a concern,” said Josh Ong on the technology blog The Next Web.

“The bigger issue, however, is that they were tied to additional personal information, including user names, device names, notification tokens, cell phone numbers and addresses, that could potentially lead to identity theft.”

Johannes Ullrich of the SANS Internet Storm Center said it was difficult to verify the report.

“There is nothing else in the file that would implicate the FBI. So this data may very well come from another source. But it is not clear who would have a file like this,” he told AFP.

Ullrich said it is unclear why the FBI, if the report were true, would have the data.

“The size of the file… would imply a widespread, not a targeted tracking operation, or the file was just kept in case any of the users in the file needs to be tracked,” he said.

“The significance of this breach very much hinges on the source, which as far as I know, hasn’t been authenticated yet. The data is, however, real based on some of the reports that people do find their own UDID in the file.”

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...