HOME

TheInfoList



OR:

Goatse Security (GoatSec) was a loose-knit, nine-person
grey hat A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker. The term came into us ...
hacker group Hacker groups are informal communities that began to flourish in the early 1980s, with the advent of the home computer. Overview Prior to that time, the term ''hacker'' was simply a referral to any computer hobbyist. The hacker groups were out ...
that specialized in uncovering security flaws. It was a division of the anti-blogging
Internet trolling In slang, a troll is a person who posts or makes inflammatory, insincere, digressive, extraneous, or off-topic messages online (such as in social media, a newsgroup, a forum, a chat room, a online video game), or in real life, with the in ...
organization known as the
Gay Nigger Association of America The Gay Nigger Association of America (GNAA) was an Internet trolling group. They targeted several prominent websites and Internet personalities including ''Slashdot'', Wikipedia, CNN, Barack Obama, Alex Jones, and prominent members of the ...
(GNAA). The group derives its name from the Goatse.cx
shock site A shock site is a website that is intended to be offensive or disturbing to its viewers, though it can also contain elements of humor or evoke (in some viewers) sexual arousal. Shock-oriented websites generally contain material such as pornograp ...
, and it chose "Gaping Holes Exposed" as its
slogan A slogan is a memorable motto or phrase used in a clan, political slogan, political, Advertising slogan, commercial, religious, and other context as a repetitive expression of an idea or purpose, with the goal of persuading members of the publi ...
. The website has been abandoned without an update since May 2014. In June 2010, Goatse Security obtained the
email addresses An email address identifies an email box to which messages are delivered. While early messaging systems used a variety of formats for addressing, today, email addresses follow a set of specific rules originally standardized by the Internet Engineer ...
of approximately 114,000 Apple iPad users. This led to an
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
investigation and the filing of criminal charges against two of the group's members.


Founding

The GNAA had several security researchers within its membership. According to Goatse Security spokesperson Leon Kaiser, the GNAA could not fully utilize their talents since the group believed that there would not be anyone who would take security data published by the GNAA seriously. In order to create a medium through which GNAA members can publish their security findings, the GNAA created Goatse Security in December 2009.


Discovery of browser vulnerabilities

In order to protect its web browser from inter-protocol exploitation,
Mozilla Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape. The Mozilla community uses, develops, spreads and supports Mozilla products, thereby promoting exclusively free software and open standards, wi ...
blocked several
ports A port is a maritime facility comprising one or more wharves or loading areas, where ships load and discharge cargo and passengers. Although usually situated on a sea coast or estuary, ports can also be found far inland, such as H ...
that
HTML forms A webform, web form or HTML form on a web page allows a user to enter data that is sent to a Server (computing), server for processing. Forms can resemble form (document), paper or database forms because web users fill out the forms using checkboxe ...
would not normally have access to. In January 2010, the GNAA discovered that Mozilla's blocks did not cover port 6667, which left Mozilla browsers vulnerable to cross-protocol scripts. The GNAA crafted a
JavaScript JavaScript (), often abbreviated as JS, is a programming language that is one of the core technologies of the World Wide Web, alongside HTML and CSS. As of 2022, 98% of Website, websites use JavaScript on the Client (computing), client side ...
-based
exploit Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably. Exploit can mean: *Exploitation of natural resources *Exploit (computer security) * Video game exploit *Exploitat ...
in order to
flood A flood is an overflow of water ( or rarely other fluids) that submerges land that is usually dry. In the sense of "flowing water", the word may also be applied to the inflow of the tide. Floods are an area of study of the discipline hydrol ...
IRC Internet Relay Chat (IRC) is a text-based chat system for instant messaging. IRC is designed for group communication in discussion forums, called '' channels'', but also allows one-on-one communication via private messages as well as chat an ...
channels. Although
EFnet EFnet or Eris-Free network is a major Internet Relay Chat (IRC) network, with more than 35,000 users. It is the modern-day descendant of the original IRC network. History Initially, most IRC servers formed a single IRC network, to which new ser ...
and
OFTC The Open and Free Technology Community (OFTC) is an IRC network that provides collaboration services to members of the free software community in any part of the world. OFTC is an associated project of Software in the Public Interest, a non-prof ...
were able to block the attacks,
Freenode Freenode, stylized as freenode and formerly known as Open Projects Network, is an IRC network which was previously used to discuss peer-directed projects. Their servers are accessible from the hostname , which load balances connections by usi ...
struggled to counteract the attacks. Goatse Security exposed the vulnerability, and one of its members, Andrew Auernheimer, aka "
weev Andrew Alan Escher Auernheimer ( ; born ), best known by his pseudonym weev, is an American computer hacker and professional Internet troll. Affiliated with the alt-right, the Southern Poverty Law Center has described him as being a neo-Nazi, w ...
," posted information about the exploit on
Encyclopedia Dramatica Encyclopedia Dramatica (ED; also spelled Encyclopædia Dramatica) is a satirical online community centered around a wiki that acts as a "troll archive". The site hosts racist material and shock content; as a result it was filtered from Google ...
. In March 2010, Goatse Security discovered an
integer overflow In computer programming, an integer overflow occurs when an arithmetic operation attempts to create a numeric value that is outside of the range that can be represented with a given number of digits – either higher than the maximum or lower t ...
vulnerability within Apple's web browser,
Safari A safari (; ) is an overland journey to observe wild animals, especially in eastern or southern Africa. The so-called "Big Five" game animals of Africa – lion, leopard, rhinoceros, elephant, and Cape buffalo – particularly form an importa ...
, and posted an exploit on Encyclopedia Dramatica. They found out that a person could access a blocked port by adding 65,536 to the port number. This vulnerability was also found in
Arora Arora is a community of Punjab, comprising both Hindus and Sikhs. The name is derived from their native place Aror. Historically, the Arora section of the Khatri community had been principally found in West Punjab, in the districts to the sou ...
,
iCab iCab is a web browser for Mac OS by Alexander Clauss, derived from Crystal Atari Browser (CAB) for Atari TOS compatible computers. It was one of the few browsers still updated for the classic Mac OS prior to that version being discontinued afte ...
,
OmniWeb OmniWeb is a discontinued web browser that was developed and marketed by The Omni Group exclusively for Apple's macOS operating system. Though a stable version is no longer maintained, it is still available as a free download and unstable version ...
, and Stainless. Although Apple fixed the glitch for desktop versions of Safari in March, the company left the glitch unfixed in mobile versions of the browser. Goatse Security claimed that a hacker could exploit the mobile Safari flaw in order to gain access and cause harm to the Apple
iPad The iPad is a brand of iOS and iPadOS-based tablet computers that are developed by Apple Inc. The iPad was conceived before the related iPhone but the iPhone was developed and released first. Speculation about the development, operating s ...
.


AT&T/iPad email address leak

In June 2010, Goatse Security uncovered a vulnerability within the
AT&T AT&T Inc. is an American multinational telecommunications holding company headquartered at Whitacre Tower in Downtown Dallas, Texas. It is the world's largest telecommunications company by revenue and the third largest provider of mobile tel ...
website. AT&T was the only provider of 3G service for
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple fruit tree, trees are agriculture, cultivated worldwide and are the most widely grown species in the genus ''Malus''. The tree originated in Central Asia, wh ...
's
iPad The iPad is a brand of iOS and iPadOS-based tablet computers that are developed by Apple Inc. The iPad was conceived before the related iPhone but the iPhone was developed and released first. Speculation about the development, operating s ...
in the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territorie ...
at the time. When signing up for AT&T's 3G service from an iPad, AT&T retrieves the ICC-ID from the iPad's
SIM card file:SIM-Karte von Telefónica O2 Europe - Standard und Micro.jpg, A typical SIM card (mini-SIM with micro-SIM cutout) file:Sim card.png, A smart card taken from a Global System for Mobile Communications, GSM mobile phone file:Simkarte NFC SecureE ...
and associates it with the email address provided during sign-up. In order to ease the log-in process from the iPad, the AT&T website receives the SIM card's ICC-ID and pre-populates the email address field with the address provided during sign-up. Goatse Security realized that by sending a
HTTP request The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, ...
with a valid ICC-ID embedded inside it to the AT&T website, the website would reveal the email address associated with that ICC-ID. On June 5, 2010, Daniel Spitler, aka "JacksonBrown", began discussing this vulnerability and possible ways to exploit it, including
phishing Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious softwar ...
, on an IRC channel. Goatse Security constructed a
PHP PHP is a general-purpose scripting language geared toward web development. It was originally created by Danish-Canadian programmer Rasmus Lerdorf in 1993 and released in 1995. The PHP reference implementation is now produced by The PHP Group ...
-based brute force script that would send HTTP requests with random ICC-IDs to the AT&T website until a legitimate ICC-ID is entered, which would return the email address corresponding to the ICC-ID. This script was dubbed the "iPad 3G Account Slurper." Goatse Security then attempted to find an appropriate news source to disclose the leaked information, with Auernheimer attempting to contact
News Corporation News Corporation (abbreviated News Corp.), also variously known as News Corporation Limited, was an American multinational mass media corporation controlled by media mogul Rupert Murdoch and headquartered at 1211 Avenue of the Americas in Ne ...
and
Thomson Reuters Thomson Reuters Corporation ( ) is a Canadian multinational media conglomerate. The company was founded in Toronto, Ontario, Canada, where it is headquartered at the Bay Adelaide Centre. Thomson Reuters was created by the Thomson Corpora ...
executives, including Arthur Siskind, about AT&T's security problems. On June 6, 2010, Auernheimer sent emails with some of the ICC-IDs recovered in order to verify his claims. Chat logs from this period also reveal that attention and publicity may have been incentives for the group. Contrary to what it first claimed, the group initially revealed the security flaw to
Gawker Media Gawker Media LLC (formerly Blogwire, Inc. and Gawker Media, Inc.) was an American Online and offline, online Mass media, media company and Link farm#Blog network, blog network. It was founded by Nick Denton in October 2003 as Blogwire, and was ba ...
''before'' notifying AT&T and also exposed the data of 114,000 iPad users, including those of celebrities, the government and the military. These tactics re-provoked significant debate on the proper disclosure of IT security flaws. Auernheimer has maintained that Goatse Security used common industry standard practices and has said that, "We tried to be the good guys".
Jennifer Granick Jennifer Stisa Granick (born 1969) is an American attorney and educator. Senator Ron Wyden has called Granick an "NBA all-star of surveillance law." She is well known for her work with intellectual property law, free speech, privacy law, and othe ...
of the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
has also defended the tactics used by Goatse Security. On June 14, 2010,
Michael Arrington J. Michael Arrington (born March 13, 1970) is the American founder and former co-editor of TechCrunch, a blog covering the Silicon Valley technology start-up communities and the wider technology field in America and elsewhere. Magazines such as ...
of
TechCrunch TechCrunch is an American online newspaper focusing on high tech and startup companies. It was founded in June 2005 by Archimedes Ventures, led by partners Michael Arrington and Keith Teare. In 2010, AOL acquired the company for approximately ...
awarded the group a Crunchie award for public service. This was the first time a Crunchie was awarded outside the annual Crunchies award ceremony. The
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
then opened an investigation into the incident, leading to a criminal complaint in January 2011United States District Court — District Court of New Jersey, Docket: MAG 11-4022 (CCC). Filed with the court January 13, 2011 and a raid on Auernheimer's house. The search was related to the AT&T investigation and Auernheimer was subsequently detained and released on bail on state drug charges, later dropped. After his release on bail, he broke a
gag order A gag order (also known as a gagging order or suppression order) is an order, typically a legal order by a court or government, restricting information or comment from being made public or passed onto any unauthorized third party. The phrase may ...
to protest and to dispute the legality of the search of his house and denial of access to a
public defender A public defender is a lawyer appointed to represent people who otherwise cannot reasonably afford to hire a lawyer to defend themselves in a trial. Several countries provide people with public defenders, including the UK, Hungary and Singapore, ...
. He also asked for donations via
PayPal PayPal Holdings, Inc. is an American multinational financial technology company operating an online payments system in the majority of countries that support online money transfers, and serves as an electronic alternative to traditional paper ...
, to defray legal costs.AT&T iPad 'hacker' breaks gag order to rant at cops
The Register ''The Register'' is a British technology news website co-founded in 1994 by Mike Magee, John Lettice and Ross Alderson. The online newspaper's masthead sublogo is "''Biting the hand that feeds IT''." Their primary focus is information tec ...
, John Leyden. July 7, 2010
In 2011 the Department of Justice announced that he will be charged with one count of conspiracy to access a computer without authorization and one count of fraud. A co-defendant, Daniel Spitler, was released on bail. On November 20, 2012, Auernheimer was found guilty of one count of identity fraud and one count of conspiracy to access a computer without authorization, and
tweeted Twitter is an online social media and social networking service owned and operated by American company Twitter, Inc., on which users post and interact with 280-character-long messages known as "tweets". Registered users can post, like, and ...
that he would appeal the ruling. Alex Pilosov, a friend who was also present for the ruling, tweeted that Auernheimer would remain free on bail until sentencing, "which will be at least 90 days out." On November 29, 2012, Auernheimer authored an article in
Wired Magazine ''Wired'' (stylized as ''WIRED'') is a monthly American magazine, published in print and online magazine, online editions, that focuses on how emerging technologies affect culture, the economy, and politics. Owned by Condé Nast, it is headquar ...
entitled "Forget Disclosure - Hackers Should Keep Security Holes to Themselves," advocating the disclosure of any
zero-day exploit A zero-day (also known as a 0-day) is a computer-software vulnerability previously unknown to those who should be interested in its mitigation, like the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it t ...
only to individuals who will "use it in the interests of social justice." On April 11, 2014, the Third Circuit issued an opinion vacating Auernheimer's conviction, on the basis that venue in New Jersey was improper.Case: 13-1816 Document: 003111586090
/ref> The judges did not address the substantive question on the legality of the site access. He was released from prison late on April 11.


Other accomplishments

In May 2011, a
DoS DOS is shorthand for the MS-DOS and IBM PC DOS family of operating systems. DOS may also refer to: Computing * Data over signalling (DoS), multiplexing data onto a signalling channel * Denial-of-service attack (DoS), an attack on a communicat ...
vulnerability affecting several
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
distributions was disclosed by Goatse Security, after the group discovered that a lengthy
Advanced Packaging Tool Advanced package tool, or APT, is a free-software user interface that works with core libraries to handle the installation and removal of software on Debian, and Debian-based Linux distributions. APT simplifies the process of managing software ...
URL would cause
compiz Compiz () is a compositing window manager for the X Window System, using 3D graphics hardware to create fast compositing desktop effects for window management. Effects, such as a minimization animation or a cube workspace, are implemented as lo ...
to crash. In September 2012, Goatse Security was credited by
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washing ...
for helping to secure their online services.


References


External links

* {{Hacking in the 2010s Hacker groups Computer security organizations Organizations established in 2009