Twitter hacked; 250,000 users must reset their passwords
- 02 February, 2013 01:08
Twitter's servers have been breached by "extremely sophisticated" hackers who may have made off with user names and passwords for about 250,000 users, according to the company.
Twitter said unusual access patterns led it to identify the attacks, which took place during the past week.
"We discovered one live attack and were able to shut it down in process moments later. However, our investigation has thus far indicated that the attackers may have had access to limited user information -- usernames, email addresses, session tokens and encrypted/salted versions of passwords -- for approximately 250,000 users," Twitter Director of Information Security Bob Lord said in a blog post.
Twitter reset the passwords and revoked session tokens for the accounts, and said it was emailing the affected users on Friday and telling them to reset their passwords.
"This attack was not the work of amateurs, and we do not believe it was an isolated incident," the company said in its post.
It noted that The New York Times and The Wall Street Journal also said they'd been targeted by hackers this week. Those companies said the attacks originated in China, but Twitter did not point to a country of origin.
Twitter said it thinks other companies and organizations have recently been similarly attacked.
It urged all its users to ensure they are using strong passwords on Twitter and elsewhere on the Internet. Passwords should be at least 10 characters and use a mix of upper- and lowercase letters, as well as numbers and symbols, the site said.
"Using the same password for multiple online accounts significantly increases your odds of being compromised," Twitter said. "If you are not using good password hygiene, take a moment now to change your Twitter passwords."
The company said it was still gathering information about the attacks and is working with federal law enforcement agencies to prosecute the attackers.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
Chandler Macleod recruits new user virtualization platform
One of Australasia’s largest and most successful recruitment and human capital management companies share their success story after recruiting a user virtualization platform, giving them control over the users and devices that have access to specific applications.
Cloud-Based Mobile Device Security Streamlines Data Protection
Read this white paper to learn why cloud-based security offers superior protection that meets today’s requirements for identifying and preventing access to malicious sites and applications while reducing management complexity and IT staff time and effort. This whitepaper discusses: • Increased use of mobile devices and the associated risks • Ways to address security challenges • Benefits of cloud-based anti-malware solutions
The Collaboration Paradox
In this whitepaper, we look at how new collaboration tools enable global executives to get more out of teams and make faster decisions. However, these teams feel restricted by outdated communication methods that lead to slower decision making and ultimately wasted time and money. Download to hear from the most enthusiastic adopters of collaboration tools and the benefits they have seen in their workplace.