Twitter flags suspected state-sponsored attack after unusual activity from China and Saudi Arabia

Malicious actors exploited two bugs with the platform's support form to gather hidden information, including phone numbers

Twitter has confirmed its platform was hit by a suspected state-sponsored attack last month, with a host of malicious actors taking advantage of a bug to harvest users' phone numbers.

In a statement released yesterday, the social networking platform said it became aware of a host of bugs being exploited by IP addresses based in China and Saudi Arabia and noticed unusual activity involving an affected customer support form API.

Advertisement - Article continues below

Requests made from these IP addresses, which Twitter has highlighted as being associated with state-sponsored actors, targeted the support form which reports issues to Twitter staff.

Two bugs, flagged on November 15 and fixed the following day, allowed an attacker to access a user's phone number and country code, as well as establish whether or not their account had been locked by Twitter.

"Since we became aware of the issue, we have been investigating the origins and background in order to provide you with as much information as possible," the company said in a statement.

"Specifically, we observed a large number of inquiries coming from individual IP addresses located in China and Saudi Arabia.

"While we cannot confirm intent or attribution for certain, it is possible that some of these IP addresses may have ties to state-sponsored actors."

Twitter said that no action was required by account holders and that the firm has informed law enforcement of the findings of its investigation.

Advertisement - Article continues below
Advertisement - Article continues below

The second bug, which allowed malicious actors to view whether a user's account had been locked, may seem relatively inane, but accessing a user's registered phone number constitutes a far more serious breach of privacy.

Throughout its history, the social networking platform has been ripe for exploitation by state-sponsored actors, as well as cyber criminals.

Researchers, for instance, outlined earlier this year how threat actors established a three-tier 'crypto-giveaway' botnet on the platform comprising millions of fake accounts.

The platform is also facing a General Data Protection Regulation (GDPR) probe over the handling of a user's subject access request (SAR), which Twitter had refused to comply with on the grounds it would take 'disproportionate effort'.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now



What is cyber warfare?

16 Mar 2020
video conferencing

Zoom 5.0 adds 256-bit encryption to address security concerns

23 Apr 2020

WhatsApp flaw leaves users open to 'shoulder surfing' attacks

21 Apr 2020
cyber security

Microsoft AI can detect security flaws with 99% accuracy

20 Apr 2020

Most Popular

Microsoft Windows

Microsoft's latest Windows 10 update is causing yet more issues

26 May 2020

Nokia breaks 5G record with speeds nearing 5Gbps

20 May 2020
data breaches

EasyJet faces class-action lawsuit over data breach

26 May 2020