10,000 Twitter passwords leaked

Powered by SC Magazine
 

Twitter says it wasn't hacked.

Usernames and passwords of Twitter members using file-sharing application TweetGif have been leaked to the internet by a hacking group.

“LulzSec Reborn” spilled around 10,000 personal details of TweetGif users - including real names and locations.

TweetGif allows users to share and post animated gif images, using their Twitter log in. 

The group posted the details to Pastebin directing users to download the .SQL file containing the user data. 

But a spokesperson for Twitter said TweetGif’s use of authorisation protocol OAuth safeguarded its user's passwords. 

"We can confirm that all Twitter account passwords have remained secure, and no breach of our systems has occurred in connection with the events experienced by TweetGif. Regarding how TweetGif  was compromised, we can't speak on their behalf,” in said in a statement to the Huffington Post

The so-called LulzSec Reborn first appeared in March claiming to be a reformed version of the disbanded LulzSec collective - a group which fell apart after the FBI arrested core members.

It previously targeted military dating site MilitarySingles.com, dumping what it claimed to be the email details of 171,000 members of the US military.

Copyright © CRN Australia. All rights reserved.


10,000 Twitter passwords leaked
 
 
 
Top Stories
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
Sydney Trains chief thinks beyond Opal
Plots app to help you find a seat on the train.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 428

Vote