Find Out If Your Apple Device Was Among The 12 Million Units Hacked And
Tracked By The FBI
http://www.zerohedge.com/news/find-o...nd-tracked-fbi
09/04/2012 13:32 -0400
Several hours ago, the latest hacker group to gain prominence, AntiSec,
a subset of Anonymous, disclosed:
http://pastebin.com/nfVT7b0Z
that it had obtained the confidential user data contained in some some
12 million Apple units after hacking an FBI Dell Vostro notebook
computer, "used by Supervisor Special Agent Christopher K. Stangl from
FBI Regional Cyber Action Team and New York FBI Office Evidence Response
Team was breached using the AtomicReferenceArray vulnerability on Java"
which contined a file titled NCFTA_iOS_devices_intel.csv, which "turned
to be a list of 12,367,232 Apple iOS devices including Unique Device
Identifiers (UDID), user names, name of device, type of device, Apple
Push Notification Service tokens, zipcodes, cellphone numbers,
addresses, etc. the personal details fields referring to people appears
many times empty leaving the whole list incompleted on many parts."
In other words, the FBI had the personal data of a substantial number of
Apple device users, certainly all of which had been obtained without
prior permission. Naturally the question here is why on earth does the
FBI have this data, and as TNW sggests:
(http://thenextweb.com/apple/2012/09/...ed-fbi-breach/)
"They published the UDID numbers to call attention to suspicions that
the FBI used the information to track citizens. Much of the personal
data has been trimmed, however, with the hackers claiming to have left
enough for “a significant amount of users” to search for their devices."
AntiSec has subsequently released one million of these UUIDs and their
associated data. Find out if your device is on the list as explained
below.
First, courtesy of WhatsmyUDID.com, here is a simple process to find out
what the specific number is.
http://www.zerohedge.com/sites/defau...2/UDID%201.jpg
http://www.zerohedge.com/sites/defau...2/UDID%202.jpg
http://www.zerohedge.com/sites/defau...2/UDID%203.jpg
http://www.zerohedge.com/sites/defau...2/UDID%204.jpg
And then, with UDID in hand, go here:
http://thenextweb.com/apple/2012/09/...-antisec-leak/
Or, for those who are uncomfortable using the internet for uplink
purposes, can use the following instructions on how to download the full
list, via Anonymous:
Download links:
http://freakshare.com/files/6gw0653b/Rxdzz.txt.html
http://u32.extabit.com/go/28du69vxbo4ix/?upld=1
http://d01.megashares.com/dl/22GofmH/Rxdzz.txt
http://minus.com/l3Q9eDctVSXW3
https://minus.com/mFEx56uOa
http://uploadany.com/?d=50452CCA1
http://www.ziddu.com/download/20266246/Rxdzz.txt.html
http://www.sendmyway.com/2bmtivv6vhub/Rxdzz.txt.html
HOW TO GET THE CANDY ONCE YOU HAVE DOWNLOADED THE FILE
first check the file MD5:
e7d0984f7bb632ee19d8dda1337e9fba
(lol yes, a "1337" there for the lulz, God is in the detail)
then decrypt the file using openssl:
openssl aes-256-cbc -d -a -in file.txt -out decryptedfile.tar.gz
password is:
antis3cs5clockTea#579d8c28d34af73fea4354f5386a06a6
then uncompress:
tar -xvzf decryptedfile.tar.gz
and then check file integrity using the MD5 included in the password u
used to decrypt before:
579d8c28d34af73fea4354f5386a06a6


Reply With Quote