FBI Takes iPad Hacker Into Custody

The FBI announced it detained a member of a group of computer programmers allegedly involved in the Apple iPad 3G security breach that exposed the identities of more than 100,000 iPad users, including celebrities and top government officials. The breach occurred through an exploit of AT&T’s website, which allowed the organisation access to iPad users’ email addresses. The arrest of Andrew Auernheimer, 24, came after the FBI searched his house and found drug paraphernalia, the agency reported.

The Wall Street Journal reported FBI Special Agent Bryan Travers confirmed the search and Auernheimer was being held on state drug charges. The paper also reported a man named Kyle Barnthouse, identifying himself as the spokesman of Goatse Security, the group behind the breach, was not involved in writing the code leading to the security breach at AT&T. The telecommunications giant runs the wireless network the iPad operates on. The leak was first reported on Gawker, which noted political luminaries such as White House Chief of Staff Rahm Emmanuel and New York City Mayor Michael Bloomberg were among those whose email addresses were exposed through the breach.

AT&T dishonest?

Auernheimer, who operates under the pseudonym Weev, has been linked to several attacks on Internet sites and a group of computer hackers that exposed a flaw in AT&T security, which allowed the email addresses of iPad users to be revealed. After the breach, AT&T sent an email to iPad 3G owners impacted by the leak of 114,000 email addresses last week, blaming the incident on “unauthorized computer hackers” and promises to cooperate with the federal investigation into the incident.

Goatse Security revealed on 9 June that it had obtained the email addresses using a script that exploited a feature on the AT&T website. In defending itself following the letter AT&T sent to its customers, Auernheimer, writing under the name “Escher,” wrote a blog post calling AT&T dishonest. “AT&T had plenty of time to inform the public before our disclosure. It was not done. Post-patch, disclosure should be immediate– within the hour. Days afterward is not acceptable,” he wrote. “It is theoretically possible that in the span of a day (particularly after a hole was closed) that a criminal organisation might decide to use an old dataset to exploit users before the users could be enlightened about the vulnerability.”

Nathan Eddy

Nathan Eddy is a contributor to eWeek and TechWeekEurope, covering cloud and BYOD

Recent Posts

Hate Speech Watchdog CCDH To Quit Musk’s X

Target for Elon Musk's lawsuit, hate speech watchdog CCDH, announces its decision to quit X…

13 hours ago

Meta Fined €798m Over Alleged Facebook Marketplace Violations

Antitrust penalty. European Commission fines Meta a hefty €798m ($843m) for tying Facebook Marketplace to…

14 hours ago

Elon Musk Rebuked By Italian President Over Migration Tweets

Elon Musk continues to provoke the ire of various leaders around the world with his…

15 hours ago

VW, Rivian Launch Joint Venture, As Investment Rises To $5.8 Billion

Volkswagen and Rivian officially launch their joint venture, as German car giant ups investment to…

17 hours ago

AMD Axes 4 Percent Of Staff, Amid AI Chip Focus

Merry Christmas staff. AMD hands marching orders to 1,000 employees in the led up to…

20 hours ago

Tesla Recalls 2,431 Cybertrucks Over Propulsion Issue

Recall number six in 2024 for Tesla Cybertruck, and this time the fault cannot be…

21 hours ago