Linchakin

Hackers Exploited Twitter Zero-day Bug to Expose 5.4 Million Accounts

 August 07, 2022     No comments   

Hackers Exploited Twitter Zero-day Bug to Expose 5.4 Million Accounts

Over 5.4 million Twitter user accounts a threat actor compiled profiles in order to create a list of the accounts. Using this ID, the threat actor then scraped the public information associated with this account to create a threat model. 

It was recently revealed that Twitter’s platform had a zero-day bug, which has now been fixed. It was possible to link phone numbers and emails to the social networking platform via this bug.

The code change that introduced this zero-day bug in June 2021 was responsible for causing this zero-day bug. There is no information available as to whether a password has been exposed as a result of the nature of the incident.

What happened?

EHA

Through Twitter’s HackerOne bug bounty program, Twitter received a report in January 2022 that indicated that a vulnerability in Twitter’s infrastructure had been exploited. 

It was immediately investigated and corrected by Twitter after they became aware of this issue. There was no evidence to suggest that someone had exploited the vulnerability at that time, and as a result, they were unable to dissect. 

Twitter confirmed that a threat actor took advantage of the issue, even though it was brought to Twitter’s attention before the issue could be resolved, after reviewing a sample of the available data for sale.

Those accounts whose owners are able to confirm that they have been affected by this issue will be notified directly by Twitter.

Moreover, this data has already been purchased by two different threat actors at the same time. To prevent your Twitter login credentials from being stolen, users should be alert to targeted spear-phishing campaigns that use this information.

Recommendation

Here below we have mentioned all the security measures recommended by Twitter:-

  • In order to maintain the privacy of your account on Twitter, do not include a publicly known phone number.
  • The email address you provide for your Twitter account should not be a publicly known.
  • Using authentication apps, ensure that two-factor authentication is enabled for your account.
  • Make sure your account is protected from unauthorized access using hardware security keys.

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • This RTX 3080-equipped Alienware Aurora R12 Returns to its Lowest Ever PriceByJason England The Alienware Aurora R12 with RTX 3080 is now just $2,155 ...RTX 3080 gaming PCs continue to be hard to find, which makes a deal like this not only good, but very surprising to see! Right now, the Alienware Auro… Read More
  • Flexispot Kana Pro Bamboo Adjustable Standing Desk Review Conclusion This is not my first adjustable height desk, as I have assembled another one from an IKEA top and another dual motor stand from a differen… Read More
  • PCIe 6.0 Spec at Final Draft: 128 GBpsByAnton Shilov PCIe 6.0 technology development complete, IP and patent reviews in progress.PCI-SIG this week announced that the PCIe 6.0 specification has reached its Final Draft status, which is an important milestone that formally marks co… Read More
  • Amazon: Don't Blame New World for GPU Deaths, Blame Card MakersByAaron Klotz Amazon and PowerGPU confirm that New World is not to blame for GPU deaths...News outlet hardwareluxx has received an official statement from Amazon regarding GPU deaths surrounding its recently released MMO New World. Amazon s… Read More
  • Linux Finally Runs on Apple's M1-Based Computer NativelyByAnton Shilov Asahi Linux on Apple's M1 is 'usable as a basic Linux desktop,' Bringing Apple M1 support to Linux has been quite a journey so far as Apple's system-on-chips (SoCs) use loads of proprietary technolo… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates