Twitter Bug Exposed Location Data of iOS Users to Advertiser

Twitter Bug Exposed location Data of Some Users to Unknown Advertisers
Twitter disclosed a bug report that in certain conditions they have accidentally collected and shared the location data of iOS users to the advertisers, even if they opted not to share the data.

The data was collected in the condition; if the user used one or more twitter accounts on iOS devices and opted to collect the location data from one account, then the location data will be obtained from any other accounts used on that same device.

“we had intended to remove location data from the fields sent to a trusted partner during an advertising process known as real-time bidding,” reads bug report.

Twitter says that information was accidentally collected and the information was shared during the real-time bidding process with advertisement partner, “we had implemented technical measures to “fuzz” the data shared so that it was no more precise than zip code or city.”

According to Twitter, the leaked data can be used to determine an address or to map your precise movements and other details such as Twitter handle or other unique account IDs was not shared.

Twitter confirms that the “location data has not been retained and that it only existed in their systems for a short time, and was then deleted as part of their normal process.”

Now Twitter has fixed the bug and contacting people who impacted with the bug for providing status updates.

“We invite you to check your privacy settings to make sure you’re only sharing the data you want to with us. We’re very sorry this happened. We recognize and appreciate the trust you place in us and are committed to earning that trust every day.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Related Read

Again Hacker Exposed New Microsoft Unpatched Zero-day Bug In Twitter With PoC

Twitter Bug That Enables Third-party apps to get Unauthorized Access to User’s Direct Messages

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploit NFC Technology to Steal Money from ATMs and POS Terminals

In a disturbing trend, cybercriminals, predominantly from Chinese underground networks, are exploiting Near Field Communication…

5 hours ago

Threat Actors Leverage TAG-124 Infrastructure to Deliver Malicious Payloads

In a concerning trend for cybersecurity, multiple threat actors, including ransomware groups and state-sponsored entities,…

5 hours ago

Ransomware Actors Ramp Up Attacks Organizations with Emerging Extortion Trends

Unit 42’s 2025 Global Incident Response Report, ransomware actors are intensifying their cyberattacks, with 86%…

5 hours ago

New SMS Phishing Attack Weaponizes Google AMP Links to Evade Detection

Group-IB’s High-Tech Crime Trends Report 2025 reveals a sharp 22% surge in phishing websites, with…

5 hours ago

Russian Hackers Exploit Microsoft OAuth 2.0 to Target Organizations

Cybersecurity firm Volexity has tracked a series of highly targeted attacks by suspected Russian threat…

5 hours ago

Hackers Weaponize Google Forms to Bypass Email Security and Steal Login Credentials

Threat actors are increasingly leveraging Google Forms, the tech giant’s widely-used form and quiz-building tool,…

7 hours ago