Saturday, March 22, 2025
HomeData Breach330 Million Twitter Users are Urged to Change Passwords after the Twitter...

330 Million Twitter Users are Urged to Change Passwords after the Twitter Bug Exposed Them in Plain Text

Published on

SIEM as a Service

Follow Us on Google News

Twitter urges all of it’s 330 Million users to change the password immediately after a Twitter bug identified in their internal system that exposed the passwords in plain text.

To mask the password twitter uses the hashing function “bcrypt” that replaces the actual password to a random number and stored in the Twitter system. Due to this the Twitter bug that password are were added to their system before hashing process completed.

Now the company said they have resolved the issue removed the passwords, and are implementing plans to prevent this bug from happening again.

Also, the company confirms according to their investigation there is no indication of breach or misuse by anyone. The Twitter blog post doesn’t say how many users affected, according to Reuters “a person familiar with the company’s response said the number was “substantial” and that they were exposed for “several months.”

After the incident disclosure twitter’s share price dropped by 1 percent, the disclosure comes at the lawmakers urges companies on how the credentials are stored.

The General Data Protection Regulation (GDPR) is to be applied from 25 May 2018 and it applies to all companies that collect and process data belonging to European Union (EU) citizens.

GDPR introduces a requirement for all organizations to report certain types of data breaches to the relevant governing body and your customers. You must notify the relevant stakeholders if your data breach will result in discrimination, damage to reputation, financial loss or loss of confidentiality of individuals.

“We are very sorry this happened. We recognize and appreciate the trust you place in us, and are committed to earning that trust every day.” reads the company statement.

The company advised user’s Use a strong password and also two enable two-factor authentication.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control

JumpServer, a widely used open-source Privileged Access Management (PAM) tool developed by Fit2Cloud, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Infosys to Pay $17.5M in Settlement for 2023 Data Breach

Infosys, a leading IT services company, has announced that it has reached an agreement...

SpyX Data Breach Exposes Personal Information of Nearly 2 Million Users

SpyX, a company known for developing spyware, has experienced a data breach that compromised...

41% of Successful Logins Across Websites Involve Compromised Passwords

A recent analysis by Cloudflare reveals a concerning trend in online security: nearly 41%...