The conclusion for hackers stole 114,000 iPad accounts
Eventually the culprit of the AT&T cyberattack also bowed to the guilty plea after being arrested earlier this year, claiming ways to take away 114,000 iPad users' accounts.
Daniel Spitlert created script code capable of 'harvesting' the ICC-ID of AT&T 3G iPad users. Photo: internet
From June to September 2010, two young people, Andrew Auerheimer and Daniel Spitlert, broke into AT & T's management system and took away 114,000 iPad users' 3G accounts, including those of famous figures. and government officials.
In early 2011, both hackers were arrested by US police. So far, Daniel Spitlert - one of two suspects - has acknowledged his behavior. At the same time, this hacker also confirmed himself to be a member of the Goatse Security organization. The number of emails retrieved from AT&T was transferred to Gawker and quickly spread on the internet.
The duo Daniel - Andrew attacked AT&T 's administration system through a browser vulnerability with a self - created script code called "iPad 3G slurper account" capable of identifying the ICC - ID number (of a circuit type). integrated on the iPad user identification cards). Daniel's testimony exactly coincided with what the US judicial department had acquired through the chat between Daniel and Andrew.
Daniel brags to his colleague Andrew that he has created a script that can get AT & T's 3G iPad user information - Photo: US Justice Department
At the time of the incident, the Goatse group announced that they were just trying to help AT&T see the security of their site. They discovered how to break into AT & T's website management system and access the email address source with the iPad ID of the carrier's 3G network service user.
It is expected that Daniel Spitlert will face a sentence of up to 10 years in prison with a $ 500,000 fine for unauthorized access and identity theft. The sentence will be enforced immediately after the final trial in Newwark federal court, New Jersey, on September 28. And Andrew, with Daniel, is still facing private trials.
You should read it
May be interested
- The most famous horny names in historywhether black hats or white hats, hackers have had a great influence in the development of information technology all the time. here are the names of the best stunt hackers in history.
- 10 hackers are welcomed by technology firmshiring hackers to work is a wise strategy that many major technology firms have adopted.
- Anonymous threatened to knock down the New York Stock Exchangehackers have posted videos threatening to remove the website of the new york stock exchange on october 10.
- Siri - new target of hackerssiri is considered to be the outstanding and exclusive feature of iphone 4s. however, according to new information on the apple insider website, this software will quickly be hacked to be applicable on other devices.
- Setting up and connecting Remote Desktop in Windows 7microsoft's remote desktop manager feature in windows 7 can easily allow users to connect from one computer to another in the same network, and share documents, documents ... in the article below, we will show you a few basic steps in the process of setting up and using this feature in windows 7.
- Limit remote control to Teamviewerthe name teamviewer is no stranger to current internet users, and especially with some users who frequently use for remote access to better manage their work.