Feeds

Leaked Twitter accounts 'mostly banned spammers'

Tweet site downplays dump of 55,000 passwords

SANS - Survey on application security programs

Twitter has downplayed the significance of a data dump that leaked the login details of 55,000 twits.

Most of the usernames and passwords copied into a string of five Pastebin posts on Monday are either duplicates or belong to blocked spammers, according to the micro-blogging site. A spokesman said it was in the process of resetting the passwords of compromised legitimate accounts.

"We've discovered that the list of alleged accounts and passwords found on Pastebin consists of more than 20,000 duplicates, many spam accounts that have already been suspended and many login credentials that do not appear to be linked (that is, the password and username are not actually associated with each other)," Twitter's Robert Weeks told CNN.

"We are currently looking into the situation. In the meantime, we have pushed out password resets to accounts that may have been affected," he added.

It's unclear how the credentials were obtained, although one strong possibility is that hackers slurped the data from a phishing website that tricked users into revealing their login details. The motives of the miscreants who shovelled the passwords onto Pastebin also remain unclear. Airdemon, the site that broke news of the dump, suggested the dump is designed to highlight Twitter's supposed security shortcomings.

Twitter has reason to be sensitive about data breaches. A pair of digital break-ins back in 2009 resulted in a privacy lawsuit from the FTC, which was settled last year with an undertaking from the micro-blogging service to improve its security practices.

Occupy protest twit faces account occupation

In other Twitter-related news, the messaging service is fighting a court order that would compel it to turn over the personal details and direct messages sent by a tweeter allegedly involved in the Occupy Wall Street protests.

The case surrounds Malcolm Harris, who was charged with disorderly conduct during demonstrations on the Brooklyn Bridge last year. Harris was denied permission to challenge the disclosure order against the @destructuremal profile, a ruling that prompted Twitter to get involved in the case.

The American Civil Liberties Union praised Twitter over its stance, thanking Twitter for standing up for free speech and individual privacy. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.