Cyber Security

Twitter patches bug that may have spilled users’ private messages

The flaw affected one of the platform’s APIs between May 2017 and September 10 of this year, when it was patched “within hours”

Twitter has fixed a bug that is believed to have shared Direct Messages (DMs) and protected Tweets of some users with developers who were not authorized to access that information.

According to the company’s announcement, the flaw resided in its Account Activity API (AAAPI), which enables developers to create tools for communications with customers.

“If you interacted with an account or business on Twitter that relied on a developer using the AAAPI to provide their services, the bug may have caused some of these interactions to be unintentionally sent to another registered developer,” said the company on its support page. This could, for instance, be a DM to an airline that has authorized an AAAPI developer, according to Twitter. Such interactions in general may commonly contain sensitive customer-related information.

The bug affected the AAAPI from May 2017 and was fixed “within hours of discovering it” on September 10, said Twitter. Fewer than 1% of Twitter’s 335 million users are thought to have been affected by the bug. They’re all being informed via an in-app notice and on the platform’s website.

The company also said that it is working with its partner developers “to ensure that they are complying with their obligations to delete information they should not have”. Twitter has hundreds of such developers.

Speaking to CNBC, a Twitter spokesperson said that the company has found no evidence of misuse or exploitation of the data shared due to the bug, although that possibility cannot be ruled out. In addition, a complex set of circumstances was required to occur at the same time for the flaw to actually be triggered, according to Twitter, which continues to investigate the issue.

In May of this year, Twitter urged all of its users to change their passwords after it discovered a glitch in its systems that stored plain-text passwords in an internal log. Back then, the company also said that its own probe found no indication of breach or misuse of the data.





Articles You May Like

New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
Is AI ever too much AI?
Microsoft: Lace Tempest Hackers Behind Active Exploitation of MOVEit Transfer App
How to watch Apple unveil its AR/VR headset, iOS 17 and more at WWDC 2023
Critical Zero-Day Flaw Exploited in MOVEit Transfer

Leave a Reply

Your email address will not be published. Required fields are marked *