LulzSec Reborn, a 3.0 version of the earlier LulzSec, has leaked 10,000 Twitter profiles’ passwords, Usernames, real names, locations, bios, avatars and secret tokens used to authenticate their accounts.
Pastebin message posted: The leaked data was uploaded to embed upload and contains a 4 MB SQL file with all the users details.
Users table from http://tweetgif.com/ nothing serious like 10.000 twitters…
http://www.embedupload.com/?d=9ZMOMGIIQA
How Hackers and Spammer can use this?
OAuth is an authentication protocol that allows users to approve application to act on their behalf without sharing their password. If your Twitter oauth Secret Key and Token get compromised , then application or Hacker can user your Twitter account on Behalf of Your access. You can get sample script here. These accounts can be used to spam over 10000 of compromised twitter accounts.
Also if hackers are able to compromise the keys of popular applications like TweetGif and use those keys to evade Twitter's abuse controls. By using the consumer key and consumer secret key from a popular third-party Twitter application, a spammer can make it harder for Twitter to lock out all of his spam accounts at once without also locking out a large number of legitimate users of the compromised application.
How you can Protect your Twitter Account: If you are also TweetGif User, you need to go to settings > apps > deauthorize app. #TweetGif. "Revoke Access".
No comments:
Post a Comment