Operation AntiSec: Hackers steal 12 million Apple UDIDs from the FBI


An excerpt of exactly 1, 000, 001 UDIDs was published as evidence by Pastebin. In addition to the device IDs of the iPhones and iPads, the complete file should also contain the full names, addresses, postcodes and mobile numbers of the owners (however, this information was removed on Pastebin). The hackers sail under the flag of "Operation AntiSec", which is associated with hackvist groups such as Anonymous and LulzSec.

According to the Pastebin Post, the data comes from a Dell Vostro laptop owned by Supervisory Special Agent Christopher Stangl and was pulled off the FBI man via a vulnerability in Java. The file name "NCFTA_iOS_devices_intel.csv" refers in the opinion of the technology blog "The Verge" on a relationship with the US cross-national National Cyber-Forensics & Training Alliance. The composition of the data, in turn, suggests that they came from one or a group of app developers, not Apple itself.

"The Next Web" has kindly released a tool that allows any iPhone and iPad owner to check for themselves if their UDID (s) were made public in the dump. In the course of further investigation of the incident, it should also be apparent whether there is a recognizable relationship between the use of a particular iOS app and the appearance on the list. We'll keep you up to date.