Altogether, the group says they have over 12 million IDs along with the personal information of the owners of the devices.
Reads the statement released by the group:
During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of "NCFTA_iOS_devices_intel.csv" turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts. no other file on the same folder makes mention about this list or its purpose.
AntiSec says they are releasing the UDID to show the world that the FBI is likely using the information to track its own citizens. The group did cut out most of the personal data from its release, however, so users will have to search a bit for their devices in the list.
Strangely, AntiSec says it will not do any interviews until a male Gawker staff writer appears on the front page of the site wearing a tutu.
Written by: Andre Yoskowitz @ 4 Sep 2012 7:48