Goatse Security Explained

Goatse Security
aka GoatSec
Size:180px
Purpose:Hacking
Membership:Andrew "weev" Auernheimer
Sam Hocevar
Daniel Spitler
Leon Kaiser
Nick "Rucas" Price
Leader Title:Origin
Leader Title2:Platforms
Leader Title3:Founders
Leader Title4:Products
Leader Name4:Clench
Website: (defunct)

Goatse Security (GoatSec) was a loose-knit, nine-person grey hat[1] hacker group that specialized in uncovering security flaws. It was a division of the anti-blogging Internet trolling organization known as the Gay Nigger Association of America (GNAA). The group derives its name from the Goatse.cx shock site, and it chose "Gaping Holes Exposed" as its slogan. The website has been abandoned without an update since May 2014.[2]

In June 2010, Goatse Security obtained the email addresses of approximately 114,000 Apple iPad users. This led to an FBI investigation and the filing of criminal charges against two of the group's members.

Founding

The GNAA had several security researchers within its membership. According to Goatse Security spokesperson Leon Kaiser, the GNAA could not fully utilize their talents since the group believed that there would not be anyone who would take security data published by the GNAA seriously. In order to create a medium through which GNAA members can publish their security findings, the GNAA created Goatse Security in December 2009.

Discovery of browser vulnerabilities

In order to protect its web browser from inter-protocol exploitation, Mozilla blocked several ports that HTML forms would not normally have access to. In January 2010, the GNAA discovered that Mozilla's blocks did not cover port 6667, which left Mozilla browsers vulnerable to cross-protocol scripts. The GNAA crafted a JavaScript-based exploit in order to flood IRC channels. Although EFnet and OFTC were able to block the attacks, Freenode struggled to counteract the attacks. Goatse Security exposed the vulnerability, and one of its members, Andrew Auernheimer, aka "weev," posted information about the exploit on Encyclopedia Dramatica.

In March 2010, Goatse Security discovered an integer overflow vulnerability within Apple's web browser, Safari, and posted an exploit on Encyclopedia Dramatica. They found out that a person could access a blocked port by adding 65,536 to the port number. This vulnerability was also found in Arora, iCab, OmniWeb, and Stainless. Although Apple fixed the glitch for desktop versions of Safari in March, the company left the glitch unfixed in mobile versions of the browser. Goatse Security claimed that a hacker could exploit the mobile Safari flaw in order to gain access and cause harm to the Apple iPad.

AT&T/iPad email address leak

In June 2010, Goatse Security uncovered a vulnerability within the AT&T website. AT&T was the only provider of 3G service for Apple's iPad in the United States at the time. When signing up for AT&T's 3G service from an iPad, AT&T retrieves the ICC-ID from the iPad's SIM card and associates it with the email address provided during sign-up. In order to ease the log-in process from the iPad, the AT&T website receives the SIM card's ICC-ID and pre-populates the email address field with the address provided during sign-up. Goatse Security realized that by sending a HTTP request with a valid ICC-ID embedded inside it to the AT&T website, the website would reveal the email address associated with that ICC-ID.

On June 5, 2010, Daniel Spitler, aka "JacksonBrown", began discussing this vulnerability and possible ways to exploit it, including phishing, on an IRC channel. Goatse Security constructed a PHP-based brute force script that would send HTTP requests with random ICC-IDs to the AT&T website until a legitimate ICC-ID is entered, which would return the email address corresponding to the ICC-ID. This script was dubbed the "iPad 3G Account Slurper."

Goatse Security then attempted to find an appropriate news source to disclose the leaked information, with Auernheimer attempting to contact News Corporation and Thomson Reuters executives, including Arthur Siskind, about AT&T's security problems. On June 6, 2010, Auernheimer sent emails with some of the ICC-IDs recovered in order to verify his claims. Chat logs from this period also reveal that attention and publicity may have been incentives for the group.

Contrary to what it first claimed, the group initially revealed the security flaw to Gawker Media before notifying AT&T<ref name="arstechnica1"/> and also exposed the data of 114,000 iPad users, including those of celebrities, the government and the military. These tactics re-provoked significant debate on the proper disclosure of IT security flaws.[3]

Auernheimer has maintained that Goatse Security used common industry standard practices and has said that, "We tried to be the good guys".[3] [4] Jennifer Granick of the Electronic Frontier Foundation has also defended the tactics used by Goatse Security.[3]

On June 14, 2010, Michael Arrington of TechCrunch awarded the group a Crunchie award for public service. This was the first time a Crunchie was awarded outside the annual Crunchies award ceremony.[5] [6]

The FBI then opened an investigation into the incident,[7] leading to a criminal complaint in January 2011[8] and a raid on Auernheimer's house. The search was related to the AT&T investigation and Auernheimer was subsequently detained and released on bail[9] on state drug charges,[10] later dropped.[11] After his release on bail, he broke a gag order to protest and to dispute the legality of the search of his house and denial of access to a public defender. He also asked for donations via PayPal, to defray legal costs.[12] [13] In 2011 the Department of Justice announced that he will be charged with one count of conspiracy to access a computer without authorization and one count of fraud. A co-defendant, Daniel Spitler, was released on bail.[14] [15]

On November 20, 2012, Auernheimer was found guilty of one count of identity fraud and one count of conspiracy to access a computer without authorization,[16] and tweeted that he would appeal the ruling.[17] Alex Pilosov, a friend who was also present for the ruling, tweeted that Auernheimer would remain free on bail until sentencing, "which will be at least 90 days out."[18]

On November 29, 2012, Auernheimer authored an article in Wired Magazine entitled "Forget Disclosure - Hackers Should Keep Security Holes to Themselves," advocating the disclosure of any zero-day exploit only to individuals who will "use it in the interests of social justice."[19]

On April 11, 2014, the Third Circuit issued an opinion vacating Auernheimer's conviction, on the basis that venue in New Jersey was improper.[20] [21] The judges did not address the substantive question on the legality of the site access.[22] He was released from prison late on April 11.[23]

Other accomplishments

In May 2011, a DoS vulnerability affecting several Linux distributions was disclosed by Goatse Security, after the group discovered that a lengthy Advanced Packaging Tool URL would cause compiz to crash.[24]

In September 2012, Goatse Security was credited by Microsoft for helping to secure their online services.

Notes and References

  1. Kirsch . Cassandra . The Grey Hat Hacker: Reconciling Cyberspace Reality and the Law . Northern Kentucky Law Review . 2014 . 41 . 386 .
  2. Web site: Compiz vulnerability « Goatse Security . October 15, 2019 . July 24, 2019 . https://web.archive.org/web/20190724180836/http://security.goatse.fr/compiz-denial-of-service-vulnerability . dead .
  3. News: Computer Experts Face Backlash . Ben . Worthen . Spencer E. Ante . WSJ.com . June 14, 2010 .
  4. News: Leydon. John. AT&T iPad 'hacker' breaks gag order to rant at cops. February 16, 2011. The Register. July 7, 2010.
  5. News: Arrington. Michael. We're Awarding Goatse Security A Crunchie Award For Public Service. March 31, 2010. Tech Crunch. June 14, 2010.
  6. News: Patterson. Ben. AT&T apologizes for iPad breach, blames hackers. March 31, 2010. Yahoo! News. June 14, 2010.
  7. News: Ryan . Tate . Apple's Worst Security Breach: 114,000 iPad Owners Exposed . . . June 9, 2010 . June 13, 2010 . dead . https://web.archive.org/web/20100612222852/http://gawker.com/5559346/apples-worst-security-breach-114000-ipad-owners-exposed . June 12, 2010 .
  8. United States District Court — District Court of New Jersey, Docket: MAG 11-4022 (CCC). Filed with the court January 13, 2011
  9. News: Jesse . Emspak . Gabriel . Perna . Arrested Hacker's Web Site Reveals Extremist Views . . . June 17, 2010 . July 11, 2010 . March 6, 2020 . https://web.archive.org/web/20200306210500/https://www.ibtimes.com/articles/29267/20100617/goatse-hacker-blog-shows-extremist-views.htm . dead .
  10. News: Programmer Detained After FBI Search . Andrew . Dowell . The Wall Street Journal . June 17, 2010 .
  11. News: Criminal charges filed against AT&T iPad attackers — Computerworld. January 18, 2011. April 18, 2011. October 10, 2012. https://web.archive.org/web/20121010212917/http://www.computerworld.com/s/article/9205403/Criminal_charges_filed_against_AT_T_iPad_attackers. dead.
  12. https://www.theregister.co.uk/2010/07/07/ipad_hack_follow_up/ AT&T iPad 'hacker' breaks gag order to rant at cops
  13. Web site: Hypocrites and Pharisees. Goatse.fr. weev. April 18, 2011. May 24, 2017. https://web.archive.org/web/20170524100145/http://security.goatse.fr/hypocrites-and-pharisees. dead.
  14. News: Voigt. Kurt. No bail for 2nd iPad e-mail address theft suspect. February 15, 2011. MSNBC.com. January 21, 2011. Associated Press.
  15. News: Porter. David. Suspect in iPad Data Theft Released on Bail in NJ. March 2, 2011. ABC News. February 28, 2011. Associated Press.
  16. News: Hacker Found Guilty of Breaching AT&T Site to Obtain iPad Customer Data | Threat Level | Wired.com . Kim . Zetter. November 20, 2012.
  17. Web site: Twitter status, 3:38 PM - 20 Nov 12.
  18. Web site: Twitter status, 3:32 PM - 20 Nov 12.
  19. Forget Disclosure - Hackers Should Keep Security Holes to Themselves . Wired . Doug . Bierend . November 29, 2012.
  20. http://pdfserver.amlaw.com/nlj/auernheimer-op-usca3.pdf Case: 13-1816 Document: 003111586090
  21. News: Kravets. David. Appeals court reverses hacker/troll "weev" conviction and sentence. April 11, 2014. Ars Technica. April 11, 2014.
  22. News: Hill. Kashmir. Weev Freed, But Court Punts On Bigger 'Hacking vs. Security Research' Question. April 11, 2014. Forbes. April 11, 2014.
  23. News: Voreacos. David. AT&T Hacker 'Weev' Parties and Tweets as Case Still Looms. April 14, 2014. Bloomberg. April 14, 2014.
  24. Web site: Lucian . Constantin. Dangerous Linux Denial of Service Vulnerability Disclosed as 0-Day. March 25, 2014. May 16, 2011. Softpedia.