Saturday, November 2, 2024
HomeBackdoorTwitter Bug Exposed Location Data of iOS Users to Advertiser

Twitter Bug Exposed Location Data of iOS Users to Advertiser

Published on

Malware protection

Twitter Bug Exposed location Data of Some Users to Unknown Advertisers
Twitter disclosed a bug report that in certain conditions they have accidentally collected and shared the location data of iOS users to the advertisers, even if they opted not to share the data.

The data was collected in the condition; if the user used one or more twitter accounts on iOS devices and opted to collect the location data from one account, then the location data will be obtained from any other accounts used on that same device.

“we had intended to remove location data from the fields sent to a trusted partner during an advertising process known as real-time bidding,” reads bug report.

- Advertisement - SIEM as a Service

Twitter says that information was accidentally collected and the information was shared during the real-time bidding process with advertisement partner, “we had implemented technical measures to “fuzz” the data shared so that it was no more precise than zip code or city.”

According to Twitter, the leaked data can be used to determine an address or to map your precise movements and other details such as Twitter handle or other unique account IDs was not shared.

Twitter confirms that the “location data has not been retained and that it only existed in their systems for a short time, and was then deleted as part of their normal process.”

Now Twitter has fixed the bug and contacting people who impacted with the bug for providing status updates.

“We invite you to check your privacy settings to make sure you’re only sharing the data you want to with us. We’re very sorry this happened. We recognize and appreciate the trust you place in us and are committed to earning that trust every day.”

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Related Read

Again Hacker Exposed New Microsoft Unpatched Zero-day Bug In Twitter With PoC

Twitter Bug That Enables Third-party apps to get Unauthorized Access to User’s Direct Messages

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...