Close Menu
  • Homepage
  • Local News
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
  • Business
  • Technology
  • Health
  • Lifestyle
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
Facebook X (Twitter) Instagram Pinterest
JHB NewsJHB News
  • Local
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
Let’s Fight Corruption
JHB NewsJHB News
Home»Technology»Twitter data breach shows APIs are a goldmine for PII and social engineering 
Technology

Twitter data breach shows APIs are a goldmine for PII and social engineering 

January 7, 2023No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Gartner analysts reveal 8 cybersecurity predictions for 2023 
Share
Facebook Twitter LinkedIn Pinterest Email

Try all of the on-demand classes from the Clever Safety Summit right here.


A Twitter API vulnerability shipped in June 2021 (and later patched) has come again to hang-out the group. In December, one hacker claimed to have the private knowledge of 400 million customers on the market on the darkish net, and simply yesterday, attackers launched the account particulars and e-mail addresses of 235 million customers totally free. 

Info uncovered as a part of the breach embrace customers’ account names, handles, creation date, follower depend and e-mail addresses. When put collectively, menace actors can create social engineering campaigns to trick customers into handing over their private knowledge. 

Whereas the data uncovered was restricted to customers’ publicly accessible info, the high-volume of accounts uncovered in a single location gives menace actors with a goldmine of knowledge they will use to orchestrate extremely focused social engineering assaults. 

Twitter: A social engineering gold mine 

Social media giants supply cybercriminals a gold mine of knowledge they will use to conduct social engineering scams. 

Occasion

Clever Safety Summit On-Demand

Be taught the important function of AI & ML in cybersecurity and business particular case research. Watch on-demand classes right this moment.

Watch Right here

With only a title, e-mail handle and contextual info taken from a person’s public profile, a hacker can conduct reconnaissance on a goal and develop purpose-built scams and phishing campaigns to trick them into handing over private info.

“This leak primarily doxxes the private e-mail addresses of high-profile customers (but in addition of normal customers), which can be utilized for spam harassment and even makes an attempt to hack these accounts,” mentioned Miklos Zoltan, Privateness Affairs safety researcher. “Excessive-profit customers could get inundated with spam and phishing makes an attempt on a mass scale.”

For that reason, Zoltan recommends that customers create totally different passwords for every website they use to scale back the danger of account takeover makes an attempt.

The hyperlink between social engineering and API hacks 

Insecure APIs present cybercriminals with a direct line to entry person’s personally identifiable info (PII), usernames and passwords, that are captured when a consumer makes a connection to a third-party service’s API. Thus, API assaults present attackers with a window to reap private knowledge for scams en masse. 

This occurred only a month in the past when a menace actor efficiently utilized to the FBI’s InfraGuard intelligence sharing service, and used an API vulnerability to gather the information of 80,000 executives throughout the personal sector and put it up on the market on the darkish net. 

Info collected through the incident included knowledge resembling usernames, e-mail addresses, Social Safety numbers and dates of start — all extremely precious info for growing social engineering scams and spear phishing assaults. 

Sadly, it seems that this pattern of API exploitation will solely worsen, with Gartner predicting that this 12 months, API abuse will grow to be probably the most frequent assault vector. 

Past APIs that ‘simply work’

Organizations too are more and more involved round API safety, with 94% of expertise decision-makers reporting they’re solely reasonably assured of their group’s capability to materially scale back API knowledge safety points. 

Any more, enterprises that leverage APIs should be rather more proactive about baking safety into their merchandise, whereas customers have to take further warning round doubtlessly malicious emails. 

“It is a widespread instance of how an unsecured API that builders design to ‘simply work’ can stay unsecured, as a result of in terms of safety, what’s out-of-sight is usually out-of-mind,” mentioned Jamie Boote, affiliate software program safety advisor at Synopsys Software program Integrity Group. “Any more, it’s most likely greatest to only delete any emails that seem like they’re from Twitter to keep away from phishing scams.” 

Defending APIs and PII 

One of many core challenges round addressing API breaches is the truth that trendy enterprises want to find and safe hundreds of APIs.  

“Defending organizations from API assaults requires constant, diligent oversight of vendor administration, and particularly guaranteeing that each API is match to be used,” mentioned Chris Bowen, CISO at ClearDATA. “It’s so much for organizations to handle, however the danger is simply too nice to not.”

There’s additionally a slim margin for error, as a single vulnerability can put person knowledge straight prone to exfiltration. 

“In healthcare, for instance, the place affected person knowledge is at stake, each API ought to handle a number of elements like id administration, entry administration, authentication, authorization, knowledge transport and alternate safety, and trusted connectivity,” mentioned Bowen. 

It’s additionally vital that safety groups not make the error of relying solely on easy authentication choices resembling usernames and passwords to guard their APIs. 

“In right this moment’s atmosphere, fundamental usernames and passwords are now not sufficient,” mentioned Will Au, senior director for DevOps, operations and website reliability at Jitterbit. “It’s now important to make use of requirements resembling two-factor authentication (2FA) and/or safe authentication with OAuth.”

Different steps like deploying a Internet Software Firewall (WAF), and monitoring API site visitors in real-time will help to detect malicious exercise and scale back the prospect of compromise. 



Source link

APIs breach data Engineering goldmine PII shows social Twitter
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Activision winds down Call of Duty: Warzone Mobile support: Here’s what it means for players | Technology News

May 17, 2025

US dollar rises after data, set for fourth straight weekly gain

May 17, 2025

Qualcomm unveils Snapdragon 7 Gen 4 with improved performance and Wi-Fi audio | Technology News

May 17, 2025

Google I/O 2025 Date And Time, How To Watch Google Event Live Streaming Full Schedule Here

May 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Wistron says new US plants will be ready for Nvidia’s server production next year

May 17, 2025

Late-night traffic banned on Hebbal flyover from Bengaluru airport side till Wednesday amid BDA development work | Bangalore News

May 17, 2025

Shashi Tharoor, Ravi Shankar Prasad, Supriya Sule, Kanimozhi among MPs leading all-party delegations to spread Operation Sindoor message across world

May 17, 2025

Bhagyashree recommends 4 exercises to work your obliques; learn why they are important for women in their 40s | Fitness News

May 17, 2025
Popular Post

Lamine Yamal’s trademark trivela: Dissecting the Barcelona star’s work of art

Israel blocks entry of all humanitarian aid into Gaza

IPL 2024 Orange Cap: Virat Kohli moves ahead of Riyan Parag in standings updated after RCB vs LSG | Ipl News

Subscribe to Updates

Get the latest news from JHB News about Bangalore, Worlds, Entertainment and more.

JHB News
Facebook X (Twitter) Instagram Pinterest
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
© 2025 Jhb.news - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.