.

tes

Labels

Friday, September 7, 2012

AntiSec Has Leaked Over 1 Million Apple Device UDID’s Taken From FBI Laptop

During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of ”NCFTA_iOS_devices_intel.csv” turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts. no other file on the same folder makes mention about this list or its purpose.

 Download links:
http://freakshare.com/files/6gw0653b/Rxdzz.txt.html
http://u32.extabit.com/go/28du69vxbo4ix/?upld=1
http://d01.megashares.com/dl/22GofmH/Rxdzz.txt
http://minus.com/l3Q9eDctVSXW3
https://minus.com/mFEx56uOa
http://uploadany.com/?d=50452CCA1
http://www.ziddu.com/download/20266246/Rxdzz.txt.html
http://www.sendmyway.com/2bmtivv6vhub/Rxdzz.txt.html

HOW TO GET THE CANDY ONCE YOU HAVE DOWNLOADED THE FILE

first check the file MD5:
e7d0984f7bb632ee19d8dda1337e9fba

(lol yes, a "1337" there for the lulz, God is in the detail)

then decrypt the file using openssl:
openssl aes-256-cbc -d -a -in file.txt -out decryptedfile.tar.gz

password is:
antis3cs5clockTea#579d8c28d34af73fea4354f5386a06a6

then uncompress:
tar -xvzf decryptedfile.tar.gz

and then check file integrity using the MD5 included in the password u used to
decrypt before:
579d8c28d34af73fea4354f5386a06a6





0 comments :