Free Republic
Browse · Search
General/Chat
Topics · Post Article


1 posted on 09/04/2012 9:01:43 AM PDT by RushIsMyTeddyBear
[ Post Reply | Private Reply | View Replies ]


To: RushIsMyTeddyBear

Here is the link to see if your device was part of the doc dump.

http://pastehtml.com/udid?udid=473d6e1ebf0b100ed172ce5f69c97ba6c8f12ad5

Original story about the hack:

http://www.theblaze.com/stories/hackers-release-alleged-evidence-showing-fbi-tracking-u-s-citizens/


2 posted on 09/04/2012 9:03:09 AM PDT by RushIsMyTeddyBear (Bocephus hits a home run! http://www.youtube.com/watch?v=Rt_vjPqAVzI)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: RushIsMyTeddyBear
From the hackers' post on Pastebin (posted yesterday, 310.8K hits):

During the second week of March 2012, a Dell Vostro notebook, used by
Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action
Team and New York FBI Office Evidence Response Team was breached using the
AtomicReferenceArray vulnerability on Java, during the shell session some files
were downloaded from his Desktop folder one of them with the name of
"NCFTA_iOS_devices_intel.csv" turned to be a list of 12,367,232 Apple iOS
devices including Unique Device Identifiers (UDID), user names, name of device,
type of device, Apple Push Notification Service tokens, zipcodes, cellphone
numbers, addresses, etc. the personal details fields referring to people
appears many times empty leaving the whole list incompleted on many parts. no
other file on the same folder makes mention about this list or its purpose.

Breach enabled by Java.

3 posted on 09/04/2012 9:26:21 AM PDT by cynwoody
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson