Hacking

Twitter resets account login credentials for exposed accounts

Twitter investigated account login credentials recently offered for sale on the dark web, locked the accounts and reset their passwords.

This week a Russian hacker offered for sale more than 32 million Twitter account credentials on the Dark Web.

The alleged Russian hacker offered Twitter account credentials for 10 Bitcoins (over $5,800). In response to the data leak Twitter has reset an unknown number of accounts.

According to Twitter the data weren’t stolen from its systems, instead, they were alleged gathered through a malware-based attack on its users.

“We’ve investigated claims of Twitter @names and passwords available on the “dark web,” and we’re confident the information was not obtained from a hack of Twitter’s servers.” reported Twitter in a blog post.

“The purported Twitter @names and passwords may have been amassed from combining information from other recent breaches, malware on victim machines that are stealing passwords for all sites, or a combination of both. Regardless of origin, we’re acting swiftly to protect your Twitter account.”

The company decided to adopt further security measures to protect accounts whose data are available in the criminal underground. Its experts identified valid login credentials leaked online, then locked the accounts and reset their passwords.

“In each of the recent password disclosures, we cross-checked the data with our records. As a result, a number of Twitter accounts were identified for extra protection. Accounts with direct password exposure were locked and require a password reset by the account owner.”

Twitter also included in the post some recommendations for the protection of the accounts and more in general about the correct use of passwords.

Below the suggestion published in the post:

  1. Enable login verification (e.g. two factor authentication). This is the single best action you can take to increase your account security.
  2. Use a strong password that you don’t reuse on other websites.
  3. Use a password manager such as 1Password or LastPass to make sure you’re using strong, unique passwords everywhere.

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – Twitter account credentials,data)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

3 hours ago

The street lights in Leicester City cannot be turned off due to a cyber attack

A cyber attack on Leicester City Council resulted in certain street lights remaining illuminated all…

4 hours ago

North Korea-linked APT groups target South Korean defense contractors

The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…

15 hours ago

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

1 day ago

A cyber attack paralyzed operations at Synlab Italia

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…

1 day ago

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…

2 days ago

This website uses cookies.