A patch was rolled out that fixed the major issue, but according to Restore Privacy, it was already too late as a malicious individual that uses the username " devil" had already exploited the flaw and scraped 5,485,636 Twitter accounts. Zhirinovskiy contacted Twitter support about the security flaw, which was found in Twitter's Android app, and was rewarded a $5,040 bug bounty for the discovery. ![]() ![]() Zhirinovskiy explained that a malicious party could easily find an individual's Twitter account with a phone number or email address. According to the report, the vulnerability was a gaping hole within the platform's cybersecurity, and just within a few days, Zhirinovskiy was able to successfully infiltrate and discover Twitter accounts linked to specific numbers and email addresses. A cybersecurity expert that goes by the name Zhirinovskiy took to the HackerOne forum in January to report a vulnerability within Twitter's login pipeline.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |