Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Twitter Fixed Issue That Allowed Matching Phone Numbers to Accounts
Starting form December of 2019, Twitter became aware of multiple accounts that were being used for malicious purposes. It was discovered that some malicious actors that could have been located in Iran, Israel, and Malaysia had been exploiting an API vulnerability that allowed users to be linked with their phone numbers. This allowed the attackers to obtain contact information of specific users which could have been used in several directions, however, the reason or target for this exploitation is unknown. In the following investigation, Twitter found many more accounts that were taking advantage of the same vulnerability and immediately suspended them, soon following up by the proper security patches.
You must be logged in to reply to this topic.