Hackers gain access to Twitter users' info

Last updated 17:54 02/02/2013

Related Links

US looking at action against China cyberattacks

Relevant offers

National News

Ryan Crotty gets first start for the All Blacks Counselling for sex offence football coach Vigilance urged after toddler wanders from preschool Impaled worker pulled meat hook out himself Japanese educator world's oldest man Treaty plan on the move Woman turns her home into cat hospice Fake Judith Collins resignation shocks SIS handover to Slater probed Home detention for assault on ex-All Black

Twitter confirmed that it had become the latest victim in a number of high-profile cyber-attacks against media companies, saying that hackers may have gained access to information on 250,000 of its more than 200 million active users.

The social media giant said in a blog posting that earlier this week it detected attempts to gain access to its user data. It shut down one attack moments after it was detected.

But it discovered that the attackers may have stolen user names, email addresses and encrypted passwords belonging to 250,000 users.

Twitter reset the pilfered passwords and sent emails advising affected users.

The online attack comes on the heels of recent hacks into the computer systems of US media and technology companies, including The New York Times and The Wall Street Journal.

Both American newspapers reported this week that their computer systems had been infiltrated by China-based hackers, likely to monitor media coverage the Chinese government deems important.

China has been accused of mounting a widespread, aggressive cyber-spying campaign for several years, trying to steal classified information and corporate secrets and to intimidate critics.

The Chinese foreign ministry could not be reached for comment, but the Chinese government has said those accusations are baseless and that China itself is a victim of cyber-attacks.

''Chinese law forbids hacking and any other actions that damage Internet security,'' the Chinese Defence Ministry recently said.

''The Chinese military has never supported any hacking activities.'' Although Twitter said in its blog that the attack ''was not the work of amateurs, and we do not believe it was an isolated incident.''

''The attackers were extremely sophisticated, and we believe other companies and organisations have also been recently similarly attacked,'' the blog said.

''For that reason we felt that it was important to publicise this attack while we still gather information, and we are helping government and federal law enforcement in their effort to find and prosecute these attackers to make the Internet safer for all users.''

One expert said that the Twitter hack probably happened after an employee's home or work computer was compromised through vulnerabilities in Java, a commonly used computing language whose weaknesses have been well publicised.

Ashkan Soltani, an independent privacy and security researcher, said such a move would give attackers ''a toehold'' in Twitter's internal network, potentially allowing them either to sniff out user information as it travelled across the company's system or break into specific areas, such as the authentication servers that process users' passwords.

Ad Feedback

In a telephone interview Friday, Soltani said that the relatively small number of users affected suggested either that attackers weren't on the network long or that they were only able to compromise a subset of the company's servers.

Twitter is generally used to broadcast messages to the public, so the hacking might not immediately have yielded any important secrets.

But the stolen credentials could be used to eavesdrop on private messages or track which Internet address a user is posting from.

That might be useful, for example, for an authoritarian regime trying to keep tabs on a journalist's movements. ''More realistically, someone could use that as an entry point into another service,'' Soltani said, noting that since few people bother using different passwords for different services, a password stolen from Twitter might be just as handy for reading a journalist's emails.

- Reuters

Comments

Special offers

Featured Promotions

Sponsored Content