{"id":23260,"date":"2022-07-23T12:49:47","date_gmt":"2022-07-23T12:49:47","guid":{"rendered":"https:\/\/harchi90.com\/twitter-data-breach-exposes-contact-details-for-5-4m-accounts\/"},"modified":"2022-07-23T12:49:47","modified_gmt":"2022-07-23T12:49:47","slug":"twitter-data-breach-exposes-contact-details-for-5-4m-accounts","status":"publish","type":"post","link":"https:\/\/harchi90.com\/twitter-data-breach-exposes-contact-details-for-5-4m-accounts\/","title":{"rendered":"Twitter data breach exposes contact details for 5.4M accounts"},"content":{"rendered":"
\n

A Twitter data breach has allowed an attacker to get access to the contact details of 5.4M accounts. Twitter has confirmed the security vulnerability which allowed the data to be extracted.<\/p>\n

The data \u2013 which ties Twitter handles to phone numbers and email addresses \u2013 has been offered for sale on a hacking forum, for $30,000 \u2026 <\/p>\n

Restore Privacy<\/em> reports that the breach was made possible by a vulnerability discovered back in January.<\/p>\n

\n

A verified Twitter vulnerability from January has been exploited by a threat actor to gain account data allegedly from 5.4 million users. While Twitter has since patched the vulnerability, the database allegedly acquired from this exploit is now being sold on a popular hacking forum, posted earlier today.<\/p>\n

Back in January, a report was made on HackerOne of a vulnerability that allows an attacker to acquire the phone number and\/or email address associated with Twitter accounts, even if the user has hidden these fields in the privacy settings [\u2026]<\/p>\n

A threat actor is now selling the data allegedly acquired from this vulnerability. Earlier today we noticed a new user selling the Twitter database on Breached Forums, the famous hacking forum that gained international attention earlier this month with a data breach exposing over 1 billion Chinese residents.<\/p>\n

The post is still live now with the Twitter database allegedly consisting of 5.4 million users being for sale. The seller on the hacking forum goes by the username \u201cdevil\u201d and claims that the dataset includes \u201cCelebrities, to Companies, randoms, OGs, etc.\u201d<\/p>\n<\/blockquote>\n

The owner of the hacking forum verified the authenticity of the attack, and Restore Privacy<\/em> also says that two samples of the database check out.<\/p>\n

\n

We downloaded the sample database for verification and analysis. It includes people from around the world, with public profile information as well as the Twitter user’s email or phone number used with the account.<\/p>\n

All samples we looked at match up with real-world people that can be easily verified with public profiles on Twitter.<\/p>\n<\/blockquote>\n

The privacy site contacted the seller, and was told the price of the database was $30,000.<\/p>\n

HackerOne<\/em> covered the vulnerability back in January, which allowed anyone to enter a phone number or email address, and then find the associated twitterID. This is an internal identifier used by Twitter, but can be readily converted to a Twitter handle.<\/p>\n

\n

This is a serious threat, as people can not only find users who have restricted the ability to be found by email\/phone number, but any attacker with a basic knowledge of scripting\/coding can enumerate a big chunk of the Twitter user base unavaliable to enumeration prior (create a database with phone\/email to username connections). Such bases can be sold to malicious parties for advertising purposes, or for the purposes of tageting celebrities in different malicious activities.<\/p>\n

Also a cool feature that I discovered is that you can even find the id’s of suspended Twitter accounts using this method.<\/p>\n<\/blockquote>\n

It’s likely that the attacker obtained existing databases of phone numbers and email addresses obtained in breaches of other services, and then used these details to search for corresponding Twitter IDs.<\/p>\n

There is as yet no way to check whether your account is included in the Twitter data breach. As always, it pays to be vigilant about phishing attacks \u2013 emails claiming to be from Apple, your bank, PayPal, email provider, and so on, and which ask you to login to your account. <\/p>\n

Common phishing tactics are a message telling you that your account is at risk of deletion, or sending a fake receipt for a high-value purchase, together with a link to dispute the charge.<\/p>\n

The main safeguard here is to never<\/em> click on links sent in emails. Always use your own bookmarks, or type in a known URL.<\/p>\n

\n

FTC: We use income earning auto affiliate links.<\/em> more.<\/p>\n

<\/div>\n\n

Check out 9to5Mac on YouTube for more Apple news:<\/p>\n

<\/p>\n