Risk

9/10/2012
01:21 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Apple Device ID Leak Traced To BlueToad

Stolen IDs did not come from FBI, as claimed by AntiSec, but from a Florida-based app publisher that issued an apology and said it is no longer collecting UDID data.

The source of the database containing a million Apple device identifiers that was published online last week by hacking group AntiSec was identified on Monday as BlueToad, an app publisher and analytics provider based in Orlando, Florida.

AntiSec said it had obtained the database from the FBI, which subsequently disputed that claim.

Security researcher David Schuetz, who works for the Intrepidus Group, says he identified BlueToad from patterns in the database itself.

In a blog post published on Monday, he explains how he sorted the data, identified some 15,000 duplicated UDID numbers and then linked some of those numbers to BlueToad.

[ For more background on the Apple UDID leak, read FBI, AntiSec Spar On Apple IDs. ]

Schuetz found names in the database that were shared by BlueToad employees and also discovered passwords from the company that had been leaked online. "While searching, I stumbled on a partial password dump for the company!" he noted in his blog post. "And it was dated March 14, the same week that the hackers claimed they'd hacked into the FBI computer."

Last Wednesday, in response to queries, Hutch Hicken, BlueToad's CIO, contacted Schuetz and the company began working on a response. On Monday, CEO Paul DeHart acknowledged that Blue Toad's systems had been compromised last week and that the list of Apple UDIDs came from its servers.

"We have fixed the vulnerability and are working around the clock to ensure that a security breach doesn't happen again," DeHart said in a blog post. "In doing so, we have engaged an independent and nationally-recognized security assurance company to assist in our ongoing efforts. We sincerely apologize to our partners, clients, publishers, employees and users of our apps."

DeHart claims that BlueToad does not collect sensitive personal information like credit card or social security numbers, and that the company, following Apple's recommendation earlier this year, modified its app code base to stop the reporting of UDID numbers. And now, he says, BlueToad has stopped storing UDID data sent to its servers by apps that have not yet incorporated BlueToad's new analytics code.

UDIDs are numbers used to uniquely identify iOS devices. The privacy implications of UDIDs were raised in news reports and lawsuits in 2010 and onward, and Apple has since designated the UDID API for discontinuation (through Apple itself may still choose to use UDIDs for its software). iOS devices have other identifiers like a serial number, and those with radio circuitry have other identifiers, such as International Mobile Equipment Identity (IMEI), Integrated Circuit Card ID (ICCID), or Mobile Equipment Identifier (MEID). Generally, these are not available to developers if they follow Apple's rules.

UDID numbers may not in and of themselves be considered personal information under privacy laws, but security researcher Aldo Cortesi has shown that they can be de-anonymized and linked to usernames, email addresses, GPS locations, and even Facebook profiles.

Back in 2006, when AOL released data on 20 million search queries, researchers were similarly able to connect the dots and identify people from anonymous information. The BlueToad breach underscores the fact that even seemingly anonymous information can pose a privacy risk.

When it comes to the battle against distributed denial-of-service attacks, you're not alone. With the increasing use of third-party service providers, your organization likely has a huge arsenal of bandwidth and know-how at its disposal. In our Using Service Providers To Manage DDoS Threats report, find out how to effectively marshal the resources among your providers and integrate them with your own security measures into a strategic and comprehensive DDoS protection plan. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
9/15/2012 | 9:34:38 PM
re: Apple Device ID Leak Traced To BlueToad
I thought it was quite ironic that the FBI Supervisor would let his computer be compromised. I wonder why AntiSec would claim that, possibly for more publicity. The group probably would have got away with the claim, maybe I fit wasn't so bold as to antagonize investigation. David Scheutz has a remarkable eye for detail by picking up on the pattern of his companies work. I have an Apple product and would not be happy in the least had my UDID was publicly released. It makes sense that Blue Toads would hire a security insurance company to make a public statement that they are addressing the issue, and in hopes to gain back some sort of trust from their customers.

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.