Monday, April 21, 2025
HomeBackdoorTwitter Bug Exposed Location Data of iOS Users to Advertiser

Twitter Bug Exposed Location Data of iOS Users to Advertiser

Published on

SIEM as a Service

Follow Us on Google News

Twitter Bug Exposed location Data of Some Users to Unknown Advertisers
Twitter disclosed a bug report that in certain conditions they have accidentally collected and shared the location data of iOS users to the advertisers, even if they opted not to share the data.

The data was collected in the condition; if the user used one or more twitter accounts on iOS devices and opted to collect the location data from one account, then the location data will be obtained from any other accounts used on that same device.

“we had intended to remove location data from the fields sent to a trusted partner during an advertising process known as real-time bidding,” reads bug report.

- Advertisement - Google News

Twitter says that information was accidentally collected and the information was shared during the real-time bidding process with advertisement partner, “we had implemented technical measures to “fuzz” the data shared so that it was no more precise than zip code or city.”

According to Twitter, the leaked data can be used to determine an address or to map your precise movements and other details such as Twitter handle or other unique account IDs was not shared.

Twitter confirms that the “location data has not been retained and that it only existed in their systems for a short time, and was then deleted as part of their normal process.”

Now Twitter has fixed the bug and contacting people who impacted with the bug for providing status updates.

“We invite you to check your privacy settings to make sure you’re only sharing the data you want to with us. We’re very sorry this happened. We recognize and appreciate the trust you place in us and are committed to earning that trust every day.”

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Related Read

Again Hacker Exposed New Microsoft Unpatched Zero-day Bug In Twitter With PoC

Twitter Bug That Enables Third-party apps to get Unauthorized Access to User’s Direct Messages

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector...

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector...