Friday, February 7, 2025
HomeData BreachHackers Exploited Twitter Zero-day Bug to Expose 5.4 Million Accounts

Hackers Exploited Twitter Zero-day Bug to Expose 5.4 Million Accounts

Published on

SIEM as a Service

Follow Us on Google News

Over 5.4 million Twitter user accounts a threat actor compiled profiles in order to create a list of the accounts. Using this ID, the threat actor then scraped the public information associated with this account to create a threat model. 

It was recently revealed that Twitter’s platform had a zero-day bug, which has now been fixed. It was possible to link phone numbers and emails to the social networking platform via this bug.

The code change that introduced this zero-day bug in June 2021 was responsible for causing this zero-day bug. There is no information available as to whether a password has been exposed as a result of the nature of the incident.

What happened?

Through Twitter’s HackerOne bug bounty program, Twitter received a report in January 2022 that indicated that a vulnerability in Twitter’s infrastructure had been exploited. 

It was immediately investigated and corrected by Twitter after they became aware of this issue. There was no evidence to suggest that someone had exploited the vulnerability at that time, and as a result, they were unable to dissect. 

Twitter confirmed that a threat actor took advantage of the issue, even though it was brought to Twitter’s attention before the issue could be resolved, after reviewing a sample of the available data for sale.

Those accounts whose owners are able to confirm that they have been affected by this issue will be notified directly by Twitter.

Moreover, this data has already been purchased by two different threat actors at the same time. To prevent your Twitter login credentials from being stolen, users should be alert to targeted spear-phishing campaigns that use this information.

Recommendation

Here below we have mentioned all the security measures recommended by Twitter:-

  • In order to maintain the privacy of your account on Twitter, do not include a publicly known phone number.
  • The email address you provide for your Twitter account should not be a publicly known.
  • Using authentication apps, ensure that two-factor authentication is enabled for your account.
  • Make sure your account is protected from unauthorized access using hardware security keys.
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Hackers Leveraging Image & Video Attachments to Deliver Malware

Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

OpenAI Data Breach – Threat Actor Allegedly Claims 20 Million Logins for Sale

Threat actors from dark web forums claim to have stolen and leaked 20 million...

Globe Life Ransomware Attack Exposes Personal and Health Data of 850,000+ Users

Globe Life Inc., a prominent insurance provider, has confirmed a major data breach that...

BeyondTrust Zero-Day Breach – 17 SaaS Customers API Key Compromised

BeyondTrust, a leading provider of identity and access management solutions, disclosed a zero-day breach...