Connect with us

Press Release

Online data breaches involving 5.4 million Twitter users and more private sharing

Published

on

Online data breaches involving 5.4 million Twitter users and more private sharing

An API flaw that was patched in January allowed for the theft of over 5.4 million Twitter user records that contained private information. These records were made available for free sharing on a hacker forum.

A security researcher has also revealed another enormous, possibly more significant, data dump of millions of Twitter records, illustrating how widely this flaw was utilised by threat actors.
The material is made up of public data that has been scraped as well as secretive email addresses and phone numbers.

The data breach on Twitter
In July of last year, a threat actor started charging $30,000 for the personal data of more than 5.4 million Twitter users.

The majority of the material was made up of publicly available details such Twitter IDs, names, login names, localities, and verified statuses; however, there was also private information like phone numbers and email addresses.

This information was gathered in December 2021 by utilising a Twitter API flaw that was made public through the HackerOne bug bounty programme. This flaw allowed users to submit their phone numbers and email addresses to the API in order to obtain the corresponding Twitter ID.

The threat actors might then use this ID to scrape the account’s public data to generate a user record with both private and public data. The HackerOne disclosure may have been disclosed, but BleepingComputer was informed that numerous threat actors were using the flaw to steal personal data from Twitter.

Twitter confirmed it had experienced a data breach due to an API issue resolved in January 2022 after BleepingComputer sent them a sample of the user details.

This past weekend, Pompompurin, the proprietor of the Breached hacking site, revealed to BleepingComputer that they were in charge of exploiting the flaw and producing the enormous dump of Twitter user data after another threat actor going by the name of “Devil” disclosed the vulnerability to them.

Nearly 7 million Twitter profiles with private information were found overall, including the 5.4 million records for sale and an additional 1.4 million suspended user profiles that were gathered via a separate API.

Pompompurin said that this second data dump was only privately distributed to a select group of individuals and was not sold.

Sharing of Twitter data on a hacking forum
The 5.4 million Twitter records have now been freely posted on a hacking forum twice—once in September and most recently on November 24.

This data, which includes 5,485,635 records of Twitter users, was for sale in August, and Pompompurin has confirmed this to BleepingComputer.

These records include the account’s Twitter ID, name, screen name, verified status, location, URL, description, follower count, account creation date, friends count, likes count, statuses count, and profile image URLs, along with either a private email address or phone number.

An even larger data dump was produced in secret.
Although it is troubling that threat actors gave out 5.4 million records, it is also claimed that the same vulnerability was used to create a much larger data dump.

This data dump may comprise tens of millions of Twitter records, including public data like verified status, account names, Twitter IDs, bios, and screen names, as well as personal phone numbers gathered using the same API problem.

Security expert Chad Loder, who initially reported the information on Twitter and was suspended shortly after publishing it, is the source of the information on this more serious data leak. Later, Loder published a sample of this wider data breach on Mastodon with redactions.

“I recently learned about a significant Twitter data breach that affected millions of US and EU Twitter accounts. I got in touch with a small number of the impacted accounts, and they confirmed that the stolen information is true. This breach did not happen until 2021, “Shared on Twitter by Loder

A sample file from this previously unreported Twitter data dump, which contains 1,377,132 phone numbers for people in France, has been discovered by BleepingComputer.

The phone numbers in this leak have since been verified by a large number of people, proving that this additional data breach is legitimate.

Additionally, none of these phone numbers were part of the initial data sold in August, demonstrating how much more user data was available to threat actors than Twitter had previously reported and how much broader Twitter’s data breach was than had been previously disclosed.

Additionally, Pompompurin informed BleepingComputer that they were not in charge of and were unaware of the creator of the recently found data leak, proving that other parties were utilising this API vulnerability.

According to information obtained by BleepingComputer, this recently found data dump comprises of a large number of files divided up by region codes and countries, including Europe, Israel, and the USA.

Although we were informed that it contains more than 17 million records, we were unable to independently verify this.

It is crucial to carefully review any email that purports to be from Twitter because this information might potentially be used for targeted phishing attacks to get login credentials.

You should disregard and delete any emails that encourage you to log in to a non-Twitter domain and claim that your account has been suspended, there are login problems, or you are about to lose your verified status. These emails are likely phishing attempts.

On Thursday, BleepingComputer contacted Twitter on this additional data leak of personal data, but has not heard back.

 

Continue Reading

Press Release

Rajshree Game Play Result

Published

on

Rajshree Game Play Result

If you are searching to find Play Rajshree Video Game Outcome? After that, you can find several sites here that provide in-depth information.

Results Chart for the Playrajshree Lottery game online
RAJSHREE-J. 09:00 AM: 9033: 9123: 9272: 9389: 9452: 9503: 9671: 9722: 9827: 9948: It is completely forbidden to buy lottery tickets using this website in jurisdictions where lotteries are outlawed. To play the online lottery, you must be at least 18 years old.

http://www.playrajshree.com/QuickLink/ResultChart.aspx
DSDIR, Rajshri Play Game Result
Rajshree Lottery is a fun online game where you can view the results every 15 and 20 minutes as of Mar. 13, 2022. The age requirement to play this game is 18. Good luck today. Any adult can play the online game Rajshree Lottery.

Rajshri Play Game Result


Game Rajashri to play
Welcome to play the Rajashri Lottery at Draw Time: 10:00 AM on Draw Date: 10-03-2022: Golden (GA 60-69) ShubhLaxmi (SA 20-29). The current time is: 07:06:34 PM on 10-03-2022.

https://playrajashrilott.com/
Rajshree Result – DSDIR to play
Results Chart – PLAY ONLINE PLAYRAJSHREE LOTTERY GAME. RAJSHREE-J. Mar. 12, 2022. 09:00 AM: 9033: 9123: 9272: 9389: 9452: 9503: 9671: 9722: 9827: 9948: It is completely forbidden to buy lottery tickets using this website in jurisdictions where lotteries are outlawed.

Play Rajshree Result


Goa Lottery Rajshree Results – Lottery Results
Mar. 11, 2022 The Rajshree Lottery is held daily in Goa, and the results are reported below in the table. The top prize-winning ticket and the sum earned are displayed. You can check your tickets here to see if you won the top prize in the Rajshree lottery or any of the other levels. You can also check the top reward for previous drawings.

https://www.lotto.in/goa/rajshree-results
Findings – GOA Star
Summary of the results: Golden A Game, Subhlaxmi A Game, and Rajshree A Game.

https://playrajshreegoa.com/
Results Sheet for Rajshri’s Victory
In the states where lotteries are illegal, buying lottery tickets through our website is strictly forbidden. To play the online lottery, you must be at least 18 years old.

http://playrajshriwin.com/result.php
Results from the Rajshree Lottery
Rajshree Lottery is an online game that you can play for entertainment purposes; the results are updated every 15 and 20 minutes. The age requirement to play this game is 18. Good luck today. Rajshree Lottery is an internet game that any adult can play for free. No upfront payment is necessary.

https://www.rajshreelottery.co.in/
Application Rajshree Lottery Results – Google Play
This Rajshree Lottery Sambad is unofficial and has no affiliation with any State Lottery Result Board as of October 29, 2021. We simply gathered these findings from open-source third-party websites, and we urge you to double-check them against officially released data.

https://play.google.com/store/apps/details?

id=loteryresulraj
Rajshree Outcome
Play the Rajshree lottery, Rajshree lottery, best lottery, lottery, play the Rajshree lottery result, and Rajshree lottery result. Draw time for the Rajshree Sikkim Lottery is today at 3:00 AM.

https://www.rajshree10.com/current-draw.php
The sources mentioned above should be able to provide you with information on the Play Rajshree Game Result. If not, you can contact me through the comments.

Continue Reading

Press Release

Two million Android malware apps have been discovered on Google Play.

Published

on

Two million Android malware apps have been discovered on Google Play.

Over two million individuals have been duped into installing new Android malware, phishing, and adware apps that have penetrated the Google Play store.

The programmes, which appear to be helpful utilities and system optimizers but are actually the causes of performance glitches, advertisements, and a degraded user experience, were found by Dr. Web antivirus.

One Dr. Web-illustrated app that has one million downloads is TubeBox, which is still accessible on Google Play as of this writing.

When trying to redeem the collected prizes, TubeBox consistently presents problems, despite promising users money for watching movies and advertisements on the app.

Even customers who successfully complete the final withdrawal stage never actually receive the money, according to the researchers, as the whole thing is just a ploy to keep users on the app as long as possible so they may view adverts and bring in money for the makers.

The following adware applications also showed up on Google Play in October 2022 but were later taken down:

One million downloads of the Bluetooth device auto connect (bt autoconnect group)
USB, Wi-Fi, and Bluetooth drivers (simple things for everyone) Over 100,000 downloads
Bt Autoconnect Group’s Volume, Music Equalizer: 50,000 downloads
(Hippo VPN LLC) Fast Cleaner & Cooling Master – 500 downloads

The aforementioned apps take instructions from Firebase Cloud Messaging and load the websites listed in them, which results in the fraudulent display of advertisements on the affected devices.

The remote operators might also set up an infected device to function as a proxy server in the instance of Fast Cleaner & Cooling Master, which had a low download volume. The threat actors could route their own traffic through the infected device using this proxy server.

Last but not least, Dr. Web came across a number of loan scam apps with an average of 10,000 downloads on Google Play that claimed to have a direct connection to Russian banks and investment companies.

Through malicious advertising on other apps, these apps were marketed as offering assured investment returns. Actually, the apps direct users to phishing websites where their personal data is gathered.

You should always look for bad reviews, carefully read the privacy statement, and visit the developer’s website to verify the legitimacy of an app before downloading it from Google Play.

Generally speaking, try to limit the number of installed apps on your smartphone and occasionally check to make sure Google Play Protect is turned on.

Continue Reading

Press Release

BOSTON-BASED VALO HEALTH, WHICH ANALYZES CLINICAL DATA TO IDENTIFY MOLECULES AND PREDICT THEIR CHANCES FOR USE IN DRUGS, RAISES $300M SERIES B (DANIEL MCCOY/WICHITA BUSINESS JOURNAL)

Published

on

BOSTON-BASED VALO HEALTH

Boston-based Valo Health, which analyzes clinical data to identify molecules and predict their chances for use in drugs, raises $300M Series B  —  A Boston-based company working to improve the way drugs are brought to the market has secured $110 million in Series B funding from Koch Disruptive Technologies.

Continue Reading

Trending