根據(jù) thenextweb 的報道,AntiSec 黑客團隊攻擊了FBI,并且泄露出 100 萬個蘋果設(shè)備的 UDID。他們聲稱自己有超過 1200 萬 ID,以及個人資料,包括用戶姓名、設(shè)備名稱、電話號碼和地址。
、
The AntiSec hacking group claims to have released a set of more than 1 million Apple Unique Device Identifiers (UDIDs) obtained from breaching the FBI. The group claims to have over 12 million IDs, as well as personal information such as user names, device names, notification tokens, cell phone numbers and addresses.
The hackers issued a statement with the following description on how the data was obtained:
During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of ”NCFTA_iOS_devices_intel.csv” turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts. no other file on the same folder makes mention about this list or its purpose.
They published the UDID numbers to call attention to suspicions that the FBI used the information to track citizens. Much of the personal data has been trimmed, however, with the hackers claiming to have left enough for “a significant amount of users” to search for their devices.
If AntiSec’s account of the breach is accurate, the NCFTA acronym in the filename would likely refer to the National Cyber-Forensics & Training Alliance, a non-profit corporation of experts from both the private and public sector that investigates cyber-crimes.
TNW has contacted the FBI for comment. Meanwhile, AntiSec says it will not provide further statements or interviews until a mysterious request is fulfilled to have a photo of a Gawker staff writer dressed in a tutu featured on the company’s homepage.
機翻萬歲萬歲萬萬歲!。!
AntiSec 黑客集團聲稱已釋放超過 100 萬蘋果唯一設(shè)備標識符 (UDIDs) 從違反聯(lián)邦調(diào)查局獲得一套。該集團宣稱有超過 1200 萬的 Id,以及個人信息,如用戶名、 設(shè)備名稱、 通知標記、 手機號碼和地址。黑客發(fā)表聲明,附帶的數(shù)據(jù)如何獲取以下說明:2012 年 3 月第二周,戴爾 Vostro 筆記本中,由來自美國聯(lián)邦調(diào)查局區(qū)域網(wǎng)絡(luò)行動隊和紐約聯(lián)邦調(diào)查局辦公室的證據(jù)響應(yīng)團隊主管特別代理人克里斯托弗 · K.Stangl 使用了違反使用 Java,一些文件被下載從他桌面文件夾名稱"NCFTA_iOS_devices_intel.csv"的其中之一變成一個包括獨特的設(shè)備標識符 (UDID) 的 12,367,232 蘋果 iOS 設(shè)備列表的 shell 會話期間 AtomicReferenceArray 漏洞、 用戶名稱、 設(shè)備、 裝置、 蘋果推送通知服務(wù)標記、 zipcodes、 手機號碼、 地址等個人詳細信息指的人們的字段類型的名稱將出現(xiàn)多次空留下許多零件不全的整個列表。沒有其他文件相同的文件夾上使談及此列表或其目的。他們出版的 UDID 編號,以提請注意聯(lián)邦調(diào)查局用信息來跟蹤公民的猜疑。很多的個人數(shù)據(jù)已被截斷,不過,自稱有留下足夠的"用戶數(shù)量可觀"的黑客來搜索他們的設(shè)備。如果違背行為的 AntiSec 的帳戶是準確的在文件名中的 NCFTA 縮寫可能指國家的網(wǎng)絡(luò)取證及培訓(xùn)聯(lián)盟、 專家的私營和公共部門的一個非贏利機構(gòu),負責(zé)調(diào)查網(wǎng)絡(luò)犯罪。TNW 已聯(lián)絡(luò)聯(lián)邦調(diào)查局對此置評。與此同時,AntiSec 說,它不會提供進一步的語句或訪談直到神秘的請求履行 — — 有特色公司的主頁上圖圖穿著一個 Gawker 員工作家的一張照片。居然敢對特務(wù)頭頭動手
遲早會玩脫!不是藍翔干的么也就是說FBI可以分分秒秒查到每個蘋果用戶的詳細資料?這機翻太糟糕了
也就是說FBI可以分分秒秒查到每個蘋果用戶的詳細資料?
其他也行,美國監(jiān)控不是鬧著玩這幾天應(yīng)該是藍翔入學(xué)考試的時間壯哉我大藍翔~
這幾天應(yīng)該是藍翔入學(xué)考試的時間
畢業(yè)考什么?破解霸天虎密碼?
藍翔表示對此次攻擊負責(zé)!
FBI還真不是特務(wù)頭子........只不過是高級警察罷了......
特務(wù)頭子是CIA NSA..........
老美的政府機關(guān)不管哪個基本上每天都受攻擊....我已經(jīng)不覺得新鮮了.....漏出去什么才是重點啊~我怎么覺得是新東方廚師學(xué)校啊
畢業(yè)考什么?破解霸天虎密碼?
核彈密碼 你懂得