Breaking

Twitter data breach affects 5.4 million users and more could be at stake

An old API vulnerability has been the reason for a data leak of 5.4 million Twitter users in a hacking forum. This leak included a massive amount of Twitter records as per security researcher.

The Twitter data breach had information including mobile numbers and email addresses.

Breakdown on the Twitter Data Breach

In July, an anonymous user started selling personal data of 5.4 million Twitter users for $30,000 USD. It appears most of the data sold in the hacking forum had publicly scraped data including locations, login credentials, verified status, and more.

This Twitter data breach was scraped using a Twitter API vulnerability that allowed users to have alternate sign-in options using phone numbers and email addresses.

This data is then manipulated to obtain all the publicly available information about a user. Twitter also did confirm their data breach and mentioned it happened on Jan 2022.

Along with 5.4 million user records, it seems an additional 1.4 million records were identified that belonged to suspended user accounts leading to a leakage of 7 million records in total. Instead of selling this data on the dark web, users are sharing the same on hacking forums for free.

A new data dump of Tens of millions of Twitter users is identified

Totally different from the 7 million data leaked earlier, a new data dump with tens of millions of Twitter users has been collected using the same API bug again with further data scraping done by the threat actors.

Chad Loder, a Security expert tweeted first about this and a disclosed a sample of this data breach on Mastodon.

Source: Chad Loder, Security Researcher

Twitter needs to act better while handling vulnerabilities, as the same API vulnerability was used for further data scraping and its definitely not a great security practices from the social media giant.

Considering the massive operational and positional changes that’s happening within Twitter, this new data breach of millions of data will only increase the burden on the company as well as the users, as it is the user’s data that is at stake.

With this Twitter data breach, hackers can perform spear phishing and targeted attacks for further breaches.

Source: Chad Loder, Security Researcher

If you’re a user reading this, try updating your credentials including passwords, phone numbers if possible and ensure you aren’t using the same ones elsewhere. Considering the data dump and Twitter’s not so serious security posture, nothing is secured and safe.

Recently, Google paid 392 million, followed by Meta paying $276 million in penalties for exploiting user data without their consent. And, Twitter’s data dump theft looks similar to that of Meta’s data scraping and it cost Musk and his newly acquired company a massive penalty if proven true.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

View Comments

  • As we know, almost all "sophisticated hacker attacks" and "data breaches" are inside jobs. Which one of the small army of purple-haired SJW special snowflakes, "non-binary" kiddie porn enthusiasts, mentally ill troons, and assorted shrill obnoxious weirdos who just got sent packing from Twitter melted down and did this as an act of spite? The list of suspects isn't long. Jail time IS in the offing for a crime like this, right? Right? It shouldn't be difficult to verify who had access to the data, and whose accounts it was moved through. Right?

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

2 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

2 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

3 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

3 months ago