Feeds

Leaked Twitter accounts 'mostly banned spammers'

Tweet site downplays dump of 55,000 passwords

High performance access to file storage

Twitter has downplayed the significance of a data dump that leaked the login details of 55,000 twits.

Most of the usernames and passwords copied into a string of five Pastebin posts on Monday are either duplicates or belong to blocked spammers, according to the micro-blogging site. A spokesman said it was in the process of resetting the passwords of compromised legitimate accounts.

"We've discovered that the list of alleged accounts and passwords found on Pastebin consists of more than 20,000 duplicates, many spam accounts that have already been suspended and many login credentials that do not appear to be linked (that is, the password and username are not actually associated with each other)," Twitter's Robert Weeks told CNN.

"We are currently looking into the situation. In the meantime, we have pushed out password resets to accounts that may have been affected," he added.

It's unclear how the credentials were obtained, although one strong possibility is that hackers slurped the data from a phishing website that tricked users into revealing their login details. The motives of the miscreants who shovelled the passwords onto Pastebin also remain unclear. Airdemon, the site that broke news of the dump, suggested the dump is designed to highlight Twitter's supposed security shortcomings.

Twitter has reason to be sensitive about data breaches. A pair of digital break-ins back in 2009 resulted in a privacy lawsuit from the FTC, which was settled last year with an undertaking from the micro-blogging service to improve its security practices.

Occupy protest twit faces account occupation

In other Twitter-related news, the messaging service is fighting a court order that would compel it to turn over the personal details and direct messages sent by a tweeter allegedly involved in the Occupy Wall Street protests.

The case surrounds Malcolm Harris, who was charged with disorderly conduct during demonstrations on the Brooklyn Bridge last year. Harris was denied permission to challenge the disclosure order against the @destructuremal profile, a ruling that prompted Twitter to get involved in the case.

The American Civil Liberties Union praised Twitter over its stance, thanking Twitter for standing up for free speech and individual privacy. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.