Hackers from AntiSec on Tuesday claim to have leaked 1,000,001 iPhone and iPad identifiers the group allegedly obtained from a hacked FBI laptop holding over 12 million such Apple device IDs and corresponding personal information.

According to AntiSec, the unique device identifiers (UDID) of 12,367,232 Apple iPhones and iPads were discovered and lifted during the breach of an FBI agent's notebook, reports The Next Web. UDIDs are unique 40-character codes assigned to iDevices with cellular connectivity, their primary use being app registration and tracking by developers.

From AntiSec's post:

During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of "NCFTA_iOS_devices_intel.csv" turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc.

If the alleged attack and subsequent UDID leak is legitimate, it is unclear how or why the FBI secured the Apple UDIDs.

AntiSec noted the UDIDs had varying amounts of personal data, with some having just basic personal information while others were more comprehensive and included full names and addresses. When the group published the UDID sample set, it stripped out identifying data but left Apple Device ID, Apple Push Notification Service DevToken, Device Name and Device Type data intact for users to "look if their devices are listed there or not."

It should be noted that some of the information provided in the leaked data sets are commonly available to iOS app developers as a requirement for push notifications, however private data like phone numbers and addresses are usually blocked.