📜 ⬆️ ⬇️

Vulnerability in JAVA allowed the FBI to steal data on 12 million Apple device owners

In the second half of March 2012, the AtomicReferenceArray vulnerability infiltrated the FBI special agent Christopher Stangl’s laptop and stole a file called NCFTA_iOS_devices_intel.csv from his desktop that contained a list of 12,367,232 unique identifiers (UDIDs) of iOS devices, owner names, names and device type, APN tokens and so on.

The Antisec group released information on 1,000,001 devices in open access, removing confidential information, and leaving only the fields for identifying devices.


Recovery Instructions
1. Check MD5:
e7d0984f7bb632ee19d8dda1337e9fba 

2. Decrypt the file using openssl:
 openssl aes-256-cbc -d -a -in file.txt -out decryptedfile.tar.gz 

Password:
 antis3cs5clockTea#579d8c28d34af73fea4354f5386a06a6 

3. Then unpack:
 tar -xvzf decryptedfile.tar.gz 

and check the integrity using the second part of the password above as the MD5 sum:
 579d8c28d34af73fea4354f5386a06a6 

Check if your ID is in the list here (assure that this site is used solely for verification, but not for data collection) and its author takes the initiative to find out who leaked the FBI information.

Recently, Apple began to block applications trying to gain access to the UDID, at the same time as increased security attention from the government and ordinary users.

')

Source: https://habr.com/ru/post/150845/


All Articles