It’s probably been a while since anyone thought about Apple’s router and netlabor storage combo called Time Capsule. Rerentd in 2008 and disproceedd in 2018, the product has mostly withdrawd into the sands of gadget time. So when autonomous security researcher Matthew Bryant recently bought a Time Capsule from the United Kingdom on eBay for $38 (plus more than $40 to ship it to the United States), he thought he would equitable be getting one of the stalwart white monoliths at the end of its terrestrial journey. Instead he stumbled on someskinnyg he didn’t foresee: a trove of data that euniteed to be a imitate of the main backup server for all European Apple Stores during the 2010s. The alertation holdd service tickets, employee prohibitk account data, inside company recordation, and emails.
“It had everyskinnyg you can possibly envision,” Bryant alerts WIRED. “Files had been deleted off the drive, but when I did the forensics on it, it was definitely not desopostpodemand.”
Bryant hadn’t stumbled on the Time Capsule endly by accident. At the Defcon security conference in Las Vegas on Saturday, he’s contransienting discoverings from a months-lengthened project in which he scsexual attackd secondhand electronics catalogings from sites enjoy eBay, Facebook Marketplace, and China’s Xianyu, and then ran computer vision analysis on them in an endeavor to uncover devices that were once part of corporate IT run awayts.
Bryant authenticized that the sellers hawking office devices, prototypes, and manufacturing providement frequently weren’t proposeed of their products’ significance, so he couldn’t comb tags or descriptions to discover go inpascend gems. Instead, he conceived an chooseical character recognition processing cluster by chaining together a dozen dilapidated second-generation iPhone SEs and harnessing Apple’s Live Text chooseical character-recognition feature to discover possible produceory tags, barcodes, or other corporate tags in cataloging photos. The system seeed for recent catalogings, and if it turned up a possible hit, Bryant would get an vigilant so he could appraise the device photos himself.
In the case of the Time Capsule, the cataloging photos showed a tag on the bottom of the device that shelp “Property of Apple Computer, Expensed Equipment.” After he appraised the Time Capsule’s encountereds, Bryant notified Apple about his discoverings, and the company’s London security office eventupartner asked him to ship the Time Capsule back. Apple did not promptly return a seek from WIRED for comment about Bryant’s research.
“The main company in the talk for proofs of concept is Apple, becaemploy I watch them as the most reliable challengingware company out there. They have all their challengingware specipartner counted, and they repartner nurture about the security of their operations quite a bit,” Bryant says. “But with any Fortune 500 company, it’s fundamentalpartner a promise that their stuff will end up on sites enjoy eBay and other secondhand tagets eventupartner. I can’t skinnyk of any company where I haven’t seen at least some piece of providement and got an vigilant on it from my system.”
Another vigilant from his search system led Bryant to get a prototype iPhone 14 intended for lengthener employ internpartner at Apple. Such iPhones are coveted by both horrible actors and security researchers becaemploy they frequently run distinctive versions of iOS that are less locked down than the devourr product and hold debugging functionality that’s inprecious for geting insight into the platcreate. Apple runs a program to give certain researchers access to analogous devices, but the company only grants these distinctive iPhones to a restricted group, and researchers have telderly WIRED that they are typicpartner outdated iPhone models. Bryant says he phelp $165 for the lengthener-employ iPhone 14.