SHARE
Facebook X Pinterest WhatsApp

Alleged FBI-Apple Breach Adds New Level to Hacktivism

Once in a while, I come across a situation that has me scratching my head. The story of the alleged breach of an FBI laptop and the alleged theft and publication of unique identification numbers (UDID) of 1 million iPhones and iPads may be one of the biggest head scratchers of all. As Chris Valasek, […]

Written By
SP
Sue Poremba
Sep 5, 2012

Once in a while, I come across a situation that has me scratching my head. The story of the alleged breach of an FBI laptop and the alleged theft and publication of unique identification numbers (UDID) of 1 million iPhones and iPads may be one of the biggest head scratchers of all.

As Chris Valasek, senior security research scientist at Coverity, described it to me:

There appears to be a recent leak of Apple UDIDs. These identifiers are unique to an individual Apple device and cannot be changed. Many are concerned about having their UDIDs exposed. So exactly how worried should you be? The answer is, slightly concerned. Many times developers incorrectly use a user’s UDID to do certain types of tracking or worse, authentication. Having someone’s UDID alone does not permit an attacker to actively attack and control your phone. There may be personal privacy concerns, such as location tracking or account hijacking, but while a dump of UDIDs is not good it should not provoke panic.

OK, it appears that the breach is legitimate. But did it come from the FBI? The FBI is denying it. PC World printed the official statement from the FBI:

The FBI is aware of published reports alleging that an FBI laptop was compromised and private data regarding Apple UDIDs was exposed. At this time, there is no evidence indicating that an FBI laptop was compromised or that the FBI either sought or obtained this data.

Rob Rachwald, director of security strategy, Imperva, thinks the breach did involve the FBI because the agent implicated in the breach isn’t an ordinary agent. His job is to recruit white hat hackers to work for the FBI. Rachwald also thinks the data that was reported as breached is authentic.

Bring in Scully and Mulder from the “X-Files” because the truth is out there. What that truth is we don’t know right now, and I wonder what the security implications might be without it. If a laptop was stolen and breached, what other information might have been stolen. And have only 1 million UDIDs been released?

As we try to figure out what the heck happened, Rachwald made a very good observation. This is a whole new angle on hacktivism. He said in his blog post:

This breach resembles a new innovation by hacktivists.  Specifically, they targeted an individual in the same way government-sponsored hackers (a.k.a., APT hackers) would attack.  Sure, Anonymous/Lulzsec targeted HB Gary in the past but we haven’t seen this type of attack reappear until now.  Is this part of a broader trend of hacktivists expanding their attack methods?  Could be.  For example, the recent Saudi Aramco breach used malware, a type of attack not normally associated with hacktivists.

It’s something to keep an eye on.

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.