{"id":594971,"date":"2023-01-07T05:49:40","date_gmt":"2023-01-07T11:49:40","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/01\/07\/twitter-data-breach-shows-apis-are-a-goldmine-for-pii-and-social-engineering\/"},"modified":"2023-01-07T05:49:40","modified_gmt":"2023-01-07T11:49:40","slug":"twitter-data-breach-shows-apis-are-a-goldmine-for-pii-and-social-engineering","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/01\/07\/twitter-data-breach-shows-apis-are-a-goldmine-for-pii-and-social-engineering\/","title":{"rendered":"Twitter data breach shows APIs are a goldmine for PII and social engineering\u00a0"},"content":{"rendered":"<div id=\"boilerplate_2682874\">\n<p><em>Check out all the on-demand sessions from the Intelligent Security Summit <a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\" data-type=\"URL\" data-id=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=ondemand&#038;utm_campaign=IS22_BoilerPlates\">here<\/a><\/em>.<\/p>\n<hr>\n<\/div>\n<p>A Twitter API vulnerability <a href=\"https:\/\/privacy.twitter.com\/en\/blog\/2022\/an-issue-affecting-some-anonymous-accounts\" target=\"_blank\" rel=\"noreferrer noopener\">shipped<\/a> in June 2021 (and later patched) has come back to haunt the organization. In December, one hacker claimed to have the personal data of 400 million users for sale on the dark web, and just yesterday, attackers <a href=\"https:\/\/www.washingtonpost.com\/technology\/2023\/01\/04\/witter-leak-emails-handles\/\" target=\"_blank\" rel=\"noreferrer noopener\">released<\/a> the account details and email addresses of 235 million users for free.\u00a0<\/p>\n<p>Information exposed as part of the breach include users\u2019 account names, handles, creation date, follower count and email addresses. When put together, threat actors can create social engineering campaigns to trick users into handing over their personal data.\u00a0<\/p>\n<p>While the information exposed was limited to users\u2019 publicly available information, the high-volume of accounts exposed in a single location provides threat actors with a goldmine of information they can use to orchestrate highly targeted social engineering attacks.\u00a0<\/p>\n<p>Social media giants offer cybercriminals a gold mine of information they can use to conduct social engineering scams.\u00a0<\/p>\n<div><body><\/p>\n<div id=\"boilerplate_2803147\">\n<h3>Event<\/h3>\n<div>\n<p><span>Intelligent Security Summit On-Demand<\/span><\/p>\n<p><span>Learn the critical role of AI &#038; ML in cybersecurity and industry specific case studies. Watch on-demand sessions today.<\/span><\/p>\n<\/div>\n<p><a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&#038;utm_medium=incontent&#038;utm_content=ondemand&#038;utm_campaign=IS22_InContent\"><br \/>\n                Watch Here            <\/a>\n                        <\/p>\n<\/div>\n<p><\/body><\/p>\n<p>With just a name, email address and contextual information taken from a user\u2019s public profile, a hacker can conduct reconnaissance on a target and develop purpose-built scams and <a href=\"https:\/\/venturebeat.com\/ai\/how-ai-machine-learning-changing-phishing-game\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing<\/a> campaigns to trick them into handing over personal information.<\/p>\n<p>\u201cThis leak essentially doxxes the personal email addresses of high-profile users (but also of regular users), which can be used for spam harassment and even attempts to hack those accounts,\u201d said Miklos Zoltan, <a href=\"https:\/\/www.privacyaffairs.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Privacy Affairs<\/a> security researcher.\u00a0\u201cHigh-profit users may get inundated with spam and phishing attempts on a mass scale.\u201d <\/p>\n<p>For this reason, Zoltan recommends that users create different passwords for each site they use to reduce the risk of <a href=\"https:\/\/venturebeat.com\/security\/report-account-takeover-attacks-spike-fraudsters-take-aim-at-fintech-and-crypto\/\" target=\"_blank\" rel=\"noreferrer noopener\">account takeover<\/a>\u00a0attempts.<\/p>\n<h2 id=\"h-the-link-between-social-engineering-and-api-hacks\">The link between social engineering and API hacks\u00a0<\/h2>\n<p>Insecure APIs provide cybercriminals with a direct line to access user\u2019s personally identifiable information (<a href=\"https:\/\/venturebeat.com\/data-infrastructure\/the-new-meaning-of-pii-can-you-ever-be-anonymous\/\" target=\"_blank\" rel=\"noreferrer noopener\">PII<\/a>), usernames and passwords, which are captured when a client makes a connection to a third-party service\u2019s API. Thus, API attacks provide attackers with a window to harvest personal data for scams en masse.\u00a0<\/p>\n<p>This happened just a month ago when a threat actor successfully applied to the <a href=\"https:\/\/krebsonsecurity.com\/2022\/12\/fbis-vetted-info-sharing-network-infragard-hacked\/\" target=\"_blank\" rel=\"noreferrer noopener\">FBI\u2019s<\/a> InfraGuard intelligence sharing service, and used an API vulnerability to collect the data of 80,000 executives across the private sector and put it up for sale on the dark web.\u00a0<\/p>\n<p>Information collected during the incident included data such as usernames, email addresses, Social Security numbers and dates of birth \u2014 all highly valuable information for developing social engineering scams and <a href=\"https:\/\/venturebeat.com\/security\/ransomware-vulnerabilities-soar-as-attackers-look-for-easy-targets\/\">spear phishing<\/a> attacks.\u00a0<\/p>\n<p>Unfortunately, it appears that this trend of API exploitation will only get worse, with <a href=\"https:\/\/www.gartner.com\/en\/documents\/4009103\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner<\/a> predicting that this year, API abuse will become the most frequent attack vector.\u00a0<\/p>\n<h2 id=\"h-beyond-apis-that-just-work\">Beyond APIs that \u2018just work\u2019 <\/h2>\n<p>Organizations too are increasingly concerned around <a href=\"https:\/\/cloudentity.com\/resource\/2021-state-of-api-security-privacy-and-governance-survey-results\/\" target=\"_blank\" rel=\"noreferrer noopener\">API security<\/a>, with 94% of technology decision-makers reporting they are only moderately confident in their organization\u2019s ability to materially reduce API data security issues.\u00a0<\/p>\n<p>From now on, enterprises that leverage APIs need to be much more proactive about baking security into their products, while users need to take extra caution around potentially malicious emails.\u00a0<\/p>\n<p>\u201cThis is a common example of how an unsecured API that developers design to \u2018just work\u2019 can remain unsecured, because when it comes to security, what is out-of-sight is often out-of-mind,\u201d said Jamie Boote, associate software security consultant at <a href=\"https:\/\/www.synopsys.com\/software-integrity.html\" target=\"_blank\" rel=\"noreferrer noopener\">Synopsys<\/a> Software Integrity Group. \u201cFrom now on, it\u2019s probably best to just delete any emails that look like they\u2019re from Twitter to avoid phishing scams.\u201d\u00a0<\/p>\n<h2 id=\"h-protecting-apis-and-pii\">Protecting APIs and PII\u00a0<\/h2>\n<p>One of the core challenges around addressing API breaches is the fact that modern enterprises need to discover and secure thousands of APIs.\u00a0\u00a0<\/p>\n<p>\u201cProtecting organizations from API attacks requires consistent, diligent oversight of vendor management, and specifically ensuring that every API is fit for use,\u201d said Chris Bowen, CISO at <a href=\"https:\/\/www.cleardata.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ClearDATA<\/a>. \u201cIt\u2019s a lot for organizations to manage, but the risk is too great not to.\u201d<\/p>\n<p>There\u2019s also a slim margin for error, as a single vulnerability can put user data directly at risk of exfiltration.\u00a0<\/p>\n<p>\u201cIn healthcare, for example, where patient data is at stake, every API should address several components like identity management, access management, authentication, authorization, data transport and exchange security, and trusted connectivity,\u201d said Bowen.\u00a0<\/p>\n<p>It\u2019s also important that security teams not make the mistake of relying solely on simple authentication options such as usernames and passwords to protect their APIs.\u00a0<\/p>\n<p>\u201cIn today\u2019s environment, basic usernames and passwords are no longer enough,\u201d said Will Au, senior director for DevOps, operations and site reliability at <a href=\"https:\/\/www.jitterbit.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jitterbit<\/a>.\u00a0\u201cIt\u2019s now vital to use standards such as two-factor authentication (2FA) and\/or secure authentication with OAuth.\u201d <\/p>\n<p>Other steps like deploying a Web Application Firewall (WAF), and monitoring API traffic in real-time can help to detect malicious activity and reduce the chance of compromise.\u00a0<\/p>\n<p><strong>VentureBeat&#8217;s mission<\/strong> is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. <a href=\"https:\/\/info.venturebeat.com\/website-preference-center.html\" data-type=\"URL\" data-id=\"https:\/\/info.venturebeat.com\/website-preference-center.html\">Discover our Briefings.<\/a><\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/security\/twitter-social-engineering\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Tim Keary<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out all the on-demand sessions from the Intelligent Security Summit here. A Twitter API vulnerability shipped in June 2021 (and later patched) has come back to haunt the organization. In December, one hacker claimed to have the personal data of 400 million users for sale on the dark web, and just yesterday, attackers released<\/p>\n","protected":false},"author":1,"featured_media":594972,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[252,46,687],"tags":[],"class_list":{"0":"post-594971","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-breach","8":"category-technology","9":"category-twitter"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/594971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=594971"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/594971\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/594972"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=594971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=594971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=594971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}