iTnews Asia
  • Home
  • News
  • Security

Twitter says zero-day bug leaked account data

Twitter says zero-day bug leaked account data

User enumeration bug created in July 2021, plugged in January 2022.

By Richard Chirgwin on Aug 8, 2022 3:48PM

Twitter has revealed that its July data breach, which resulted in millions of user accounts being offered for sale, was the result of an exploited zero-day vulnerability.

In late July, someone identified only by their handle, “devil”, posted to Breached Forums that they had 5.4 million Twitter user accounts and would sell the data for US$30,000 (S$41,367), as reported by Restore Privacy.

Twitter has now acknowledged that the account data was obtained through the exploitation of a zero-day vulnerability it first learned about in January 2022.

In a mea culpa published last week, Twitter explained that it was notified of the issue through its Hacker One bug bounty program.

A software update in July 2021 contained a user enumeration bug, the company said.

An attacker with knowledge of the bug could use telephone numbers to find out if a user account existed.

As “zhirinovskiy” explained in their Hacker One report, the bug meant an attacker could discover a Twitter account by phone number or email address, “even if the user has prohibited this in the privacy options”.

“The bug exists due to the process of authorisation used in the Android client of Twitter, specifically in the process of checking the duplication of a Twitter account."

Zhirinovskiy was paid US$5040 (A$7273) for the report.

As Twitter’s post confirmed, the bug “allowed someone to enter a phone number or email address into the log-in flow in an attempt to learn if that information was tied to an existing Twitter account, and if so, which specific account.”

Emails could also be used in the same way, Twitter’s post stated.

“When we learned about this, we immediately investigated and fixed it,” Twitter said.

“In July 2022, we learned through a press report that someone had potentially leveraged this and was offering to sell the information they had compiled.

“After reviewing a sample of the available data for sale, we confirmed that a bad actor had taken advantage of the issue before it was addressed.”

Twitter explained that it published the post because it was not able to contact all the affected users, especially those who were maintaining pseudonymous accounts.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
breach security software twitter

Related Articles

  • Are third-party blind spots the weakest link in enterprise cybersecurity chain?
  • Fulbright University Vietnam adopts AI assistant to cut service delays
  • Many Singapore and APAC enterprises held back by poor software quality
  • How making identity a priority can help bring clarity to AI chaos
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Are third-party blind spots the weakest link in enterprise cybersecurity chain?

Philippine education ministry hit by data leak exposing 210,020 records

Philippine education ministry hit by data leak exposing 210,020 records

Indonesia's national data centre suffers ransomware attack

Indonesia's national data centre suffers ransomware attack

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.