Twitter freezes accounts in the wake of password leak
Company requests password resets as security measure
Twitter has been freezing accounts and issuing password reset emails in the wake of a data leak that saw over 32 million passwords exposed.
The company's position was explained in an official blog post by Twitter's trust and information security officer Michael Coates, who maintained that the credentials were "not obtained from a hack of Twitter's servers".
"The purported Twitter @names and passwords may have been amassed from combining information from other recent breaches, malware on victim machines that are stealing passwords for all sites, or a combination of both," he said. "Regardless of origin, we're acting swiftly to protect your Twitter account."
As the company stated in its initial response to the news, it has cross-checked the leaked data from recent breaches on MySpace, LinkedIn and Tumblr, as well as the information discovered yesterday.
"As a result," Coates wrote, "a number of Twitter accounts were identified for extra protection. Accounts with direct password exposure were locked and require a password reset by the account owner."
"Your account won't be accessible until you do so," he warned, "to ensure that unauthorized individuals don't have access." Coates also reiterated the boilerplate security advice given by experts in these situations: use a strong password, enable two-factor authentication, and use a password manager.
09/06/2016: 32 million Twitter passwords go for sale on the dark web, but Twitter 'not hacked'
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.
Twitter has denied that its systems were breached by hackers, after more than 32 million users' passwords were found for sale on the dark web.
The news comes after a rash of data breaches from sites such as MySpace, LinkedIn and Tumblr, all of which have had user credential databases leaked online by hackers.
However, while these companies were the victims of cyberattacks, Twitter was quick to stress that the company's systems "have not been breached".
"We are confident that these usernames and credentials were not obtained by a Twitter data breach," a spokesman told IT Pro.
"In fact, we've been working to help keep accounts protected by checking our data against what's been shared from recent other password leaks."
Multiple security experts have agreed with this diagnosis, after Reddit was forced to issue reset password emails to 100,000 users because of credentials leaked in the LinkedIn hack, while Netflix and Facebook took similar action.
"The person that is selling the Twitter credentials has been behind many other similar credential leaks before," F-Secure chief research officer Mikko Hypponen told IT Pro. "So, we believe the database she is selling now is real."
The data was provided by an individual known as 'Tessa88' to database search tool LeakedSource, which wrote in a blog post that "out of 15 users we asked, all 15 verified their passwords". Many of the affected emails are Russian.
While the database is real, security experts IT Pro spoke with agreed that it is not the result of a hack. "We do not believe it's stolen from Twitter," Hypponen said, "but from users' own systems with keyloggers."
His views have been echoed by both LeakedSource and infosec analyst Graham Cluley.
Cluley confirmed that in the wake of this latest data leak, his advice for users is the same as it is after every breach, telling IT Pro: "If you're concerned your password may have been compromised, you should change it."
"Furthermore, you should change your passwords if you are using the same password anywhere else on the net - a sadly all too common problem," he warned.
"Finally, folks should enable two-step verification on their Twitter account - which should make it hard for accounts to be hijacked even if hackers have grabbed your password."
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.