GETTR is a new pro-Trump social media platform created by Jason Miller, a former Trump advisor, the Twitter-like platform suffered a data breach.
The security breach comes a few hours after its launch on July 4.
A threat actor claimed to have scraped the private information of almost 90,000 members by abusing an unsecured API and published it on the RAID hacking forum.
The exposed data includes member’s email address, nickname, profile name, profile descriptions, birth year, location, personal website, avatar URL, background images, and other data.
The data published on the hacking forum belongs to two lots, which were respectively shared on July 1 and July 5.
The first set of data was the result of a scraping activity, while the second one was obtained by abusing the unsecured GETTR API.
Multiple websites confirmed the authenticity of the data.
“The leaked data was authentic, according to checks performed by The Record.” reported The Record.
The availability of such kind of information exposes members of the social network at risk of cyberattacks, such as phishing attempts and frauds.
Members of the social network should remain vigilant on any suspicious message pretending to be from GETTR.
Follow me on Twitter: @securityaffairs and Facebook
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, data breach)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.