How to find your #UDID for your iPhone as #Anonymous posts 1,000,001 IDs on Pastebin #Antisec

It appears that Anonymous have posted 1,000,001 UDID’s from a total of 12,000,000 iOS devices that they “retreived”  from the FBI

This is the message on Pastebin – http://pastebin.com/nfVT7b0Z which they say had 370,000 hits 1 hour ago at the time of posting this.

The reason for this was to aparently expose the FBI Agent for having 12m Apple UDID on his laptop – why we wonder is the reason for this, are they being tracked?

On the Paste bin it says…..

why exposing this personal data?
well we have learnt it seems quite clear nobody pays attention if you just come
and say ‘hey, FBI is using your device details and info and who the fuck knows
what the hell are they experimenting with that’, well sorry, but nobody will care.
FBI will, as usual, deny or ignore this uncomfortable thingie and everybody will
forget the whole thing at amazing speed. so next option, we could have released
mail and a very small extract of the data. some people would eventually pick up
the issue but well, lets be honest, that will be ephemeral too.

There’s not much you can do about it as you can’t change your UDID but you can have a look to see if yours is on the list.

How to find your UDID

 1. Plug in your iPhone and open Itunes

2. Click on your device to see your iPhone Stats 

At the top it says – Name – Capacity – Software Version – Serial Number – PhoneNumber

3. Click Serial number and it will change to Identifier (UDID) this is the number that you need. 

Then according to anonymous you can download a decryptedfile of the pastebin entries to see if your UDID is on it.

From @anonymousirc – bit.ly/RHwRC5  – they say that they are working on a browsable version so you could just wait for that..

UPDATE

The Next Web have now published a safe way to find out on this Link

 

Anonymous say that they haven’t included any of your data as such –  in the document but hackers  could easily find out some information, such as your address.

This is what they actually say…

there you have. 1,000,001 Apple Devices UDIDs linking to their users and their
APNS tokens.
the original file contained around 12,000,000 devices. we decided a million would be
enough to release.
we trimmed out other personal data as, full names, cell numbers, addresses,
zipcodes, etc.
not all devices have the same amount of personal data linked. some devices
contained lot of info.
others no more than zipcodes or almost anything. we left those main columns we
consider enough to help a significant amount of users to look if their devices
are listed there or not. the DevTokens are included for those mobile hackers
who could figure out some use from the dataset.

That is about all we can do at the moment, we need two questions answered – from Apple – how to we protect our identities if the number has been posted.  And from the FBI  why do they have all of this information?

We will watch it unfold.

 

 

 

 

 

 

 

Hackers Lulz security are back with vengeance as The Sun knows #lulzsec

 

It wasn’t long ago we heard from Lutz security that their 50 days of disruption had ended.  However last night we saw them back in action as they first put a redirect on The Sun newspapers page saying that Murdoch was dead, after that the link went straight to @lulzsec feed on Twitter.

The first we knew that it was them was a little message from @lulzsec twitter account saying …

After that everyone on Twitter was talking about it, as they are now.  We followed the story on The Next Web, with continuous updates – The sun newspaper hacked.

News international soon went down, and Lutz security then went on say this is just the beginning.

One tweet said – WE HAVE JOY WE HAVE FUN, WE HAVE MESSED UP MURDOCH’S SUN.

At the end @lulzSec tweeted

 

So it looks like retirement didn’t last long ………..

 

 

 

 

 

 

After the 50 Days of Lulz ended – Anonymous promise surprising release.

Hackers Lutz Security announced their final release at the weekend, after 50 days of disruption for various corporations and governments and even Joe blogs on occasion.

Their final day of tweets on the 26th of June were these….

Lulz statement “50 days of Lulz”  inform us that it was a planned 50 days of uninterrupted, chaotic thrill of entertainment and anarchy.  And that they believe that they have brought back the AntiSec movement that started in 1999, which they truly believe in.

The Anti Security Movement

(also written as antisec and anti-sec) is a movement opposed to the computer security industry. It attempts to censor the publication of information relating to but not limited to: software vulnerabilitiesexploits, exploitation techniques,hacking tools, attacking public outlets and distribution points of that information. Movement followers have cited websites such asSecurityFocusSecuriteamPacketStormSecurity, and milw0rm to be targets of their cause, as well as mailing lists like “full-disclosure”, “vuln-dev”, “vendor-sec” and Bugtraq, as well as public forums and IRC channels.

http://en.wikipedia.org/wiki/Antisec_Movement

During lulz  last days they released documents stolen from the Arizona Department of Public Safety and files that contain internal data from AOL and a variety of user details and private information from various websites.

Don’t think its time to breathe easy, as much as it seemed that you could, as one tweet from LulzSec informs AntiSec enthursiasts to join Annoymous; who yesterday aparently released  files containing documents with FBI addresses and links to security and hacking resources on the internet, including hacking tools.  Anonymous on Twitter yesterday also promised more torrent releases today with some surprises! So its not all over.

Six days ago anonymous realised this video explaining about operation anti sec

http://www.youtube.com/watch?v=lHApqy3n3Fs

I wonder what is next ……..

Hope this helps.