Press Release
Online data breaches involving 5.4 million Twitter users and more private sharing
An API flaw that was patched in January allowed for the theft of over 5.4 million Twitter user records that contained private information. These records were made available for free sharing on a hacker forum.
A security researcher has also revealed another enormous, possibly more significant, data dump of millions of Twitter records, illustrating how widely this flaw was utilised by threat actors.
The material is made up of public data that has been scraped as well as secretive email addresses and phone numbers.
The data breach on Twitter
In July of last year, a threat actor started charging $30,000 for the personal data of more than 5.4 million Twitter users.
The majority of the material was made up of publicly available details such Twitter IDs, names, login names, localities, and verified statuses; however, there was also private information like phone numbers and email addresses.
This information was gathered in December 2021 by utilising a Twitter API flaw that was made public through the HackerOne bug bounty programme. This flaw allowed users to submit their phone numbers and email addresses to the API in order to obtain the corresponding Twitter ID.
The threat actors might then use this ID to scrape the account’s public data to generate a user record with both private and public data. The HackerOne disclosure may have been disclosed, but BleepingComputer was informed that numerous threat actors were using the flaw to steal personal data from Twitter.
Twitter confirmed it had experienced a data breach due to an API issue resolved in January 2022 after BleepingComputer sent them a sample of the user details.
This past weekend, Pompompurin, the proprietor of the Breached hacking site, revealed to BleepingComputer that they were in charge of exploiting the flaw and producing the enormous dump of Twitter user data after another threat actor going by the name of “Devil” disclosed the vulnerability to them.
Nearly 7 million Twitter profiles with private information were found overall, including the 5.4 million records for sale and an additional 1.4 million suspended user profiles that were gathered via a separate API.
Pompompurin said that this second data dump was only privately distributed to a select group of individuals and was not sold.
Sharing of Twitter data on a hacking forum
The 5.4 million Twitter records have now been freely posted on a hacking forum twice—once in September and most recently on November 24.
This data, which includes 5,485,635 records of Twitter users, was for sale in August, and Pompompurin has confirmed this to BleepingComputer.
These records include the account’s Twitter ID, name, screen name, verified status, location, URL, description, follower count, account creation date, friends count, likes count, statuses count, and profile image URLs, along with either a private email address or phone number.
An even larger data dump was produced in secret.
Although it is troubling that threat actors gave out 5.4 million records, it is also claimed that the same vulnerability was used to create a much larger data dump.
This data dump may comprise tens of millions of Twitter records, including public data like verified status, account names, Twitter IDs, bios, and screen names, as well as personal phone numbers gathered using the same API problem.
Security expert Chad Loder, who initially reported the information on Twitter and was suspended shortly after publishing it, is the source of the information on this more serious data leak. Later, Loder published a sample of this wider data breach on Mastodon with redactions.
“I recently learned about a significant Twitter data breach that affected millions of US and EU Twitter accounts. I got in touch with a small number of the impacted accounts, and they confirmed that the stolen information is true. This breach did not happen until 2021, “Shared on Twitter by Loder
A sample file from this previously unreported Twitter data dump, which contains 1,377,132 phone numbers for people in France, has been discovered by BleepingComputer.
The phone numbers in this leak have since been verified by a large number of people, proving that this additional data breach is legitimate.
Additionally, none of these phone numbers were part of the initial data sold in August, demonstrating how much more user data was available to threat actors than Twitter had previously reported and how much broader Twitter’s data breach was than had been previously disclosed.
Additionally, Pompompurin informed BleepingComputer that they were not in charge of and were unaware of the creator of the recently found data leak, proving that other parties were utilising this API vulnerability.
According to information obtained by BleepingComputer, this recently found data dump comprises of a large number of files divided up by region codes and countries, including Europe, Israel, and the USA.
Although we were informed that it contains more than 17 million records, we were unable to independently verify this.
It is crucial to carefully review any email that purports to be from Twitter because this information might potentially be used for targeted phishing attacks to get login credentials.
You should disregard and delete any emails that encourage you to log in to a non-Twitter domain and claim that your account has been suspended, there are login problems, or you are about to lose your verified status. These emails are likely phishing attempts.
On Thursday, BleepingComputer contacted Twitter on this additional data leak of personal data, but has not heard back.
Press Release
Characteristics That Set Mega888 Apart From Other Online Casinos
The world of online gaming has never been the same since the launch of Mega888. It may be argued that the casino is the greatest online casino for all of your gambling needs because it has accomplished so much in such a short period of time.
There is a list of other online casinos, however the majority of them cannot be compared to Mega888. So what precisely sets Mega888 apart from other online casinos? We’ve put together a collection of justifications to aid you comprehend Mega888’s virtues.
The casino provides patrons with a wealth of amenities. So, these are the characteristics that set Mega888 apart from other online casinos in the gambling sector.
Quality of the Online Casino Overall
Prior to going any further, it is important to note the casino’s general level of excellence. One of the main reasons Mega888 is trustworthy is because it never takes advantage of or scams its customers.
The casino will take steps to protect every player from fraud of any kind, making Mega888 a trustworthy and respectable online casino. The Mega888 team is always developing new features to improve the playing experience.
The high-quality games that Mega888 has to offer are among its best features. The online casino’s selection of games goes well beyond simply having outstanding gameplay. The online casino is top-notch because the games have incredible graphics and the casinos provide outstanding customer service to all of their customers.
Mega888 Has Several Different Games.
The range of games available at Mega888 is one of the premium attractions. Mega888 provides an incredible selection of games, all of which are of the highest calibre. The online casino offers a wide variety of games, including shooting, fishing, and arcade games.
Additionally, if you still think that this is insufficient, players can choose from a number of table games. The developers at Mega888 are constantly working to provide fresh material for the players at the online casino, so whenever a player enters the site, they will find new games.
To keep the platform updated with new games each month, the online platform occasionally undergoes maintenance. Consequently, each time you play at the online casino, you will have a distinctive gaming experience. Players can currently choose from hundreds of slot games, numerous live table games, and much more.
Mega888’s security is impenetrable.
The security of the Mega888 is one of its key characteristics. All gamers at Mega888 are helped by the security system’s design, which protects them from danger or attacks from outside sources. However, this wouldn’t have been possible if Mega888 hadn’t given the security team a sizable sum of money from their annual budget.
This indicates that the online casino places a high priority on security and won’t compromise it for anything. There is no history of fraud or account hacking at the online casino’s security. It demonstrates that the online casino ensures the confidentiality of all player financial and personal information right from the start.
You won’t ever need to be concerned about a hack or scam involving your account. The online casino has a good reputation, and Mega888 has received approval from numerous organisations as a legitimate online gaming platform. Additionally, numerous licencing companies have endorsed the casino, demonstrating that it is a secure and safe location to gamble.
The two-factor authentication barrier that Mega888 has for players between the email and the Mega888 Apk is its best security feature. This means that it would be nearly impossible for any outside attacker to access a player’s account without going through two distinct layers of security.
Additionally, if a hacker tries to steal money from a transaction, the online casino’s management team will immediately transfer the money to the legitimate owner after learning about the behaviour.
The security system’s usage of a 128-bit encryption technique is another observable aspect. The casino maintains sensitive data using this technique, including user names, passwords for Mega888 accounts, and financial information.
The online casino’s high level of encryption prevents many hackers from accessing any accounts. Last but not least, the online casino has a firewall that prevents hackers from accessing the site.
Services for Instant Cash Out Using Mega888
Every online casino has its unique cash-out options, and given that these services are available online, it is crucial for the platform to guarantee that the casino offerings are reliable and prompt. Mega888 ensures that their services are simple to use.
All of Mega888’s services to its players appear to be seamless. All that is required of players is consistency and a willingness to take financial risks when playing at an online casino. The casino has remarkable and simple processes in place so that players may withdraw their money with little hassle.
You must get in touch with a dealer in order to collect your money. You have a number of options for doing that, some of which include WeChat, real-time chat, phone calls, or WhatsApp. Make sure that the choice you choose is practical for you since the dealers Mega888 offers are knowledgeable, competent, and professional.
Every request a player submits receives a response within 24 hours, and any questions they may have will be addressed as soon as possible. Players can retrieve their money in the quickest and safest possible manner in this fashion.
Last Words
Overall, Mega888 might have a lot of characteristics that make it a casino you definitely want to play at. However, before you take the major step of gambling with your own money, it’s crucial to understand more about the games and their rules.
Press Release
PHP source code was given backdoors thanks to a compromise of the Git server.
The official PHP Git repository was breached in the most recent software supply chain attack, and the code base was modified.
Yesterday, two malicious commits were uploaded to the PHP team’s git.php.net server, which hosts the php-src Git repository.
Threat actors had verified these commits as if Rasmus Lerdorf and Nikita Popov, two well-known PHP developers and maintainers, had made them.
PHP Git server has an RCE backdoor installed.
Yesterday, two malicious contributions were uploaded to the official PHP Git repository in an effort to corrupt the PHP code base.
The event is concerning because 79% of websites on the Internet still use PHP as their server-side programming language.
The attackers released a mystery update upstream called “repair typo” in the malicious commits [1, 2] that BleepingComputer saw under the guise of a little typographical patch.
Looking closer at the newly added line 370, where the zend eval string function is used, reveals that the code in fact creates a backdoor for quickly achieving Remote Code Execution (RCE) on a website using this hacked version of PHP.
Developer Jake Birchall for PHP responded to Michael Voek, who had discovered the error originally, with the explanation, “This line executes PHP code from within the useragent HTTP header, if the string starts with ‘zerodium’.”
Nikita Popov, a PHP maintainer, explained the following to us via email:
“During a regular post-commit code review a few hours after the first commit, it was discovered. The modifications were immediately undone because they were blatantly malicious “According to Popov, BleepingComputer.
The malicious commit was also done under Rasmus Lerdorf’s identity, the person who created PHP.
But that should come as no surprise because with source code version control systems like Git, it is possible to sign off a change locally under a different identity [1, 2] and then upload the spoof commit to the remote Git server, where it appears to have been signed off by the person listed on it.
According to PHP maintainers, this malicious activity originated from the compromised git.php.net server rather than from the compromise of an individual’s Git account, despite the fact that a thorough investigation of the incident is still ongoing.
The official PHP codebase has been moved to GitHub.
Following this event, the PHP maintainers have chosen to move the official PHP source code repository to GitHub as a precaution.
We’ve made the decision to stop running the git.php.net server even though our investigation is still ongoing since we believe that keeping our own git infrastructure is an unnecessary security risk.
Popov stated that the GitHub repositories, which were previously merely mirrors, “would become canonical.”
After this modification, Popov demands that any future code updates be uploaded directly to GitHub rather than the git.php.net site.
Anyone who wants to contribute to the PHP project must now join the PHP organisation on GitHub.
The same security alert includes advice for doing that.
You would need to have two-factor authentication (2FA) set on your GitHub account in order to join the organisation.
Beyond the two commits that were mentioned, “We’re investigating the repositories for any corruption,” says Popov.
In order to learn the full scope of this attack and whether any code was transmitted downstream before the fraudulent commits were discovered, BleepingComputer contacted Popov and the PHP security team.
Although it might have been cloned or forked in the interim, no tags or release artefacts reflect the changes.
Popov added to BleepingComputer, “The changes were in the development branch for PHP 8.1, which is scheduled for release at the end of the year.
The PHP team has confirmed to BleepingComputer that they want to decommission their git server ultimately and switch to GitHub permanently in the coming days.
Press Release
ADOBE ENDS SUPPORT FOR FLASH TODAY AND WILL START BLOCKING FLASH CONTENT FROM JANUARY 12; MAJOR BROWSERS WILL BLOCK FLASH CONTENT FROM JAN. 1 (T.C. SOTTEK/THE VERGE)
Adobe ends support for Flash today and will start blocking Flash content from January 12; major browsers will block Flash content from Jan. 1 — It’s the end of the line — Adobe scheduled its famous Flash software to end on December 31st, 2020, and today is the day.
-
Apps1 year ago
Why is Everyone Talking About Hindi Keyboards?
-
Social Media1 year ago
Who is Rouba Saadeh?
-
Apps1 year ago
Things you need to know about Marathi keyboard today
-
Apps1 year ago
Stuck with Your default Bangla keyboard? Isn’t it time for a change?
-
Social Media1 year ago
Mati Marroni Instagram Wiki (Model’s Age, Net Worth, Body Measurements, Marriage)
-
Games12 months ago
Top 7 Popular Puzzle and Card Games for Relaxing Your Brain on Mobile, Featuring Solitaire
-
Entertainment1 year ago
12 Online Streaming Sites that Serve as Best Alternatives to CouchTuner
-
Entertainment1 year ago
Movierulz Website: Movierulzz 2021 Latest Movies on Movierulz.com