AT&T Sends Out Apologetic Email To iPad Security Breach-ees

Illustration for article titled AT&T Sends Out Apologetic Email To iPad Security Breach-ees

41 per cent of you may not be bothered about the AT&T iPad security breach, but for the remaining 59 per cent of Giz readers who were either outraged or slightly laissez faire about it all, this is for you:


The emails were sent out Sunday night to the 114,000 iPad customers whose email addresses were left exposed after what AT&T blamed the "malicious" work of "hackers." Email below:

June 13, 2010

Dear Valued AT&T Customer,

Recently there was an issue that affected some of our customers with AT&T 3G service for iPad resulting in the release of their customer email addresses. I am writing to let you know that no other information was exposed and the matter has been resolved. We apologize for the incident and any inconvenience it may have caused. Rest assured, you can continue to use your AT&T 3G service on your iPad with confidence.

Here's some additional detail:

On June 7 we learned that unauthorized computer "hackers" maliciously exploited a function designed to make your iPad log-in process faster by pre-populating an AT&T authentication page with the email address you used to register your iPad for 3G service. The self-described hackers wrote software code to randomly generate numbers that mimicked serial numbers of the AT&T SIM card for iPad – called the integrated circuit card identification (ICC-ID) – and repeatedly queried an AT&T web address. When a number generated by the hackers matched an actual ICC-ID, the authentication page log-in screen was returned to the hackers with the email address associated with the ICC-ID already populated on the log-in screen.

The hackers deliberately went to great efforts with a random program to extract possible ICC-IDs and capture customer email addresses. They then put together a list of these emails and distributed it for their own publicity.

As soon as we became aware of this situation, we took swift action to prevent any further unauthorized exposure of customer email addresses. Within hours, AT&T disabled the mechanism that automatically populated the email address. Now, the authentication page log-in screen requires the user to enter both their email address and their password.

I want to assure you that the email address and ICC-ID were the only information that was accessible. Your password, account information, the contents of your email, and any other personal information were never at risk. The hackers never had access to AT&T communications or data networks, or your iPad. AT&T 3G service for other mobile devices was not affected.

While the attack was limited to email address and ICC-ID data, we encourage you to be alert to scams that could attempt to use this information to obtain other data or send you unwanted email. You can learn more about phishing by visiting the AT&T website.

AT&T takes your privacy seriously and does not tolerate unauthorized access to its customers' information or company websites. We will cooperate with law enforcement in any investigation of unauthorized system access and to prosecute violators to the fullest extent of the law.

AT&T acted quickly to protect your information – and we promise to keep working around the clock to keep your information safe. Thank you very much for your understanding, and for being an AT&T customer.


Dorothy Attwood
Senior Vice President, Public Policy and Chief Privacy Officer for AT&T

[NY Times via Gawker]

Image Credit: BGR


AT&T should be ashamed of this letter. Very little of the details are correct. They are trying to pin this on some "hackers" that wanted fame and attacked AT&T, and AT&T stopped it as soon as they were told about it. None of that is true. AT&T was informed about the issue a number of times prior to it going public - they didn't do anything about it (including even respond to the notice). The release of the info wasn't "malicious" - AT&T wasn't even responding to the issue that somebody else could use, or may have already used without their knowledge, that put their client's data at risk.

AT&T's lack of a response isn't uncommon when it comes to security. I have notified a number of businesses about exploits, and it's very rare to even get a "we will address this issue" in response. Normally, if they even do address it, they wait months or more to make 1 or 2 line of code changes that put their entire system and data at risk. "Why pay somebody a few bucks to fix a security issue that nobody else may find?" comes to mind. Sorry, but I fully support what the "hackers" did. They notified the company of the issue, did not get any responses, then made it public. Maybe companies will start addressing the issue, or at least say they are aware of it now.