Twitter freezes accounts in the wake of password leak
Company requests password resets as security measure
Twitter has been freezing accounts and issuing password reset emails in the wake of a data leak that saw over 32 million passwords exposed.
The company's position was explained in an official blog post by Twitter's trust and information security officer Michael Coates, who maintained that the credentials were "not obtained from a hack of Twitter's servers".
"The purported Twitter @names and passwords may have been amassed from combining information from other recent breaches, malware on victim machines that are stealing passwords for all sites, or a combination of both," he said. "Regardless of origin, we're acting swiftly to protect your Twitter account."
"As a result," Coates wrote, "a number of Twitter accounts were identified for extra protection. Accounts with direct password exposure were locked and require a password reset by the account owner."
"Your account won't be accessible until you do so," he warned, "to ensure that unauthorized individuals don't have access." Coates also reiterated the boilerplate security advice given by experts in these situations: use a strong password, enable two-factor authentication, and use a password manager.
09/06/2016: 32 million Twitter passwords go for sale on the dark web, but Twitter 'not hacked'
Twitter has denied that its systems were breached by hackers, after more than 32 million users' passwords were found for sale on the dark web.
However, while these companies were the victims of cyberattacks, Twitter was quick to stress that the company's systems "have not been breached".
"We are confident that these usernames and credentials were not obtained by a Twitter data breach," a spokesman told IT Pro.
"In fact, we've been working to help keep accounts protected by checking our data against what's been shared from recent other password leaks."
Multiple security experts have agreed with this diagnosis, after Reddit was forced to issue reset password emails to 100,000 users because of credentials leaked in the LinkedIn hack, while Netflix and Facebook took similar action.
"The person that is selling the Twitter credentials has been behind many other similar credential leaks before," F-Secure chief research officer Mikko Hypponen told IT Pro. "So, we believe the database she is selling now is real."
The data was provided by an individual known as 'Tessa88' to database search tool LeakedSource, which wrote in a blog post that "out of 15 users we asked, all 15 verified their passwords". Many of the affected emails are Russian.
While the database is real, security experts IT Pro spoke with agreed that it is not the result of a hack. "We do not believe it's stolen from Twitter," Hypponen said, "but from users' own systems with keyloggers."
His views have been echoed by both LeakedSource and infosec analyst Graham Cluley.
Cluley confirmed that in the wake of this latest data leak, his advice for users is the same as it is after every breach, telling IT Pro: "If you're concerned your password may have been compromised, you should change it."
"Furthermore, you should change your passwords if you are using the same password anywhere else on the net - a sadly all too common problem," he warned.
"Finally, folks should enable two-step verification on their Twitter account - which should make it hard for accounts to be hijacked even if hackers have grabbed your password."
Choosing a collaboration platform
Eight questions every IT leader should askDownload now
Performance benchmark: PostgreSQL/ MongoDB
Helping developers choose a databaseDownload now
Customer service vs. customer experience
Three-step guide to modern customer experienceDownload now
Taking a proactive approach to cyber security
A complete guide to penetration testingDownload now