Twitter’s Data Leak Exposes Over 5.4 Million Users

Earlier this year, Twitter confirmed that an API vulnerability had caused a massive data leak containing non-public information for over 5.4 million Twitter users.

Twitter denied claims that hackers had leaked the private information priorly. However, Pompompurin, the owner of the hacking forum Breached, stated they were responsible for exploiting the API bug and platforming the data after another hacker shared the vulnerability with them.

The stolen data includes public information like Twitter IDs, account names, logins, locations, and verified status.  In addition, private information like phone numbers and email addresses have also been exposed. Fraudulent activities such as phishing could be carried out using this information.

In addition to the breach of the 5.4 million active accounts, private information for roughly 1.4 million suspended Twitter profiles were also shared using the same API bug. While the extent of the data breach is not fully known, security expert Chad Loder stated that information for “tens of millions” of Twitter users might have been collected using the same API bug.

To keep yourself safe, disregard emails claiming to be from Twitter that state your account is suspended. In addition, be skeptical of emails about issues logging in or the account is about to lose its verified status. These emails are probably attempting to phish for your private information to use in fraudulent activities.

Keep Your Business Running on a Rock-Solid Data Center

Related Posts:

Keep Your Business Running on a Rock-Solid Data Center

Rely on 99% uptime powered by redundant Las Vegas and Dallas facilities built for nonstop performance.

Complete The Form Below To Subscribe To Our Newsletter

password managers guide
Ai & your business
home office security
it project planning guide
Cyber Security
guide to faster wifi
MFA vs 2FA
email security attacks
2024 cyber threats
cloud backup guide
cloud security
secure data
geek speak it terms guide
bigger cyber risk
cloudstrike
email signature security
whitepaper outsourced it
it contracts
choosing hardware
data backups testing
Cybersecurity Training Essentials
Voip vs Cloud