Anti-Phishing, DMARC , API Security , Cybercrime

Expect Hacking, Phishing After Leak of 200M Twitter Records

Database of Emails, Names Will Spur New Cybercriminal Campaigns, Expert Warns
Expect Hacking, Phishing After Leak of 200M Twitter Records
Image: Twitter

Expect the recently leaked database containing over 200 million Twitter records to be an ongoing resource for hackers, fraudsters and other criminals operating online, a security expert warns.

See Also: Live Webinar | Navigating the Difficulties of Patching OT

The 93GB leaked database "will unfortunately lead to a lot of hacking, targeted phishing and doxxing" by criminals and governments alike, says Alon Gal, CTO at Israeli cybercrime intelligence firm Hudson Rock, in a post to LinkedIn. "This is one of the most significant leaks I've seen."

The leak includes 211,524,284 records, comprising names, usernames, email addresses and follower counts, according to the free data breach notification service Have I Been Pwned.

The information had been publicly offered for sale last month to Twitter CEO Elon Musk as a database of 400 million records, which was first spotted by Gal.

On Wednesday, the owner released a pared-down version - likely to eliminate duplicates - for free via a popular cybercrime forum. The identity of the individual who controls or amassed the information remains unknown.

While the Twitter data leak doesn't include passwords, many other data breaches have included such information, which experts say could be easily gathered and merged with many of these records.

Gal says the records provide useful intelligence to criminals, such as knowing which Twitter account holders are interested in - and perhaps owners of - cryptocurrency, based on accounts having .eth in their name or other crypto-themed text. The list can also be used to target high-profile accounts based on follower counts, identify "OG" accounts that have desirable usernames, target "political accounts" and unmask "'anonymous' accounts" that didn't use a unique email for Twitter, but rather an address that can be cross-indexed with other data leaks to identify the owner, he says.

Criminals Abused Twitter API

The email addresses do not appear to have been stolen from Twitter. Rather, "the data was obtained sometime in 2021 by abusing an API that enabled email addresses to be resolved to Twitter profiles," according to HIBP. Accordingly, the information was compiled well before Musk bought Twitter for $44 billion in October 2022.

This isn't the only set of data to have been compiled by individuals who used the API flaw. Last November, an attacker dumped a database containing 5.4 million users' usernames, display names, bios, locations, email addresses and phone numbers.

Twitter confirmed last August that data had been stolen from a "let others find you by your phone" feature, which it added in June 2021 and then locked down in January 2022, after receiving a bug report about the risk posed by the new functionality. Until it was fixed, Twitter said that "if someone submitted an email address or phone number to Twitter's systems, Twitter's systems would tell the person what Twitter account the submitted email addresses or phone number was associated with, if any."

Life Cycle of Breached Data

Based on sampling the first 10,000 records contained in the Twitter data dumped Wednesday, nearly every email address has appeared in previous data breaches, reports data breach expert Troy Hunt, who created and runs Have I Been Pwned.

The free breach notification service emails anyone who registers an email address whenever that address appears in a public data breach or data dump. To date, it has tracked 12.4 billion pwned accounts, and some email addresses have appeared in multiple breaches.

For the recent leak of over 200 million Twitter records, "the 98% 'pwned before' rate clearly indicates the email addresses were taken from other data breaches then used to query the vulnerable API," Hunt says via Twitter. Those queries allowed whoever compiled the data set to add the user's name, Twitter username and follower counts associated with each of the email addresses they'd tested, which were tied to a Twitter account.

Many emails contained in the sample of leaked Twitter records appear in three of the top 10 biggest breaches or collections of leaked data to date, as tracked by Have I Been Pwned:

  • 62% appear in the Collection1 data set - 773 million records total;
  • 58% appear in the ExploitIn data set - 593 million records total;
  • 26% appear in the AntiPublic data set - 458 million records total.

"No revelations here, IMHO, just confirmation that once data is out there it gets re-circulated and re-abused over and over again," Hunt says. "These addresses are only in the scraped Twitter data because they'd already been compromised elsewhere, and so the cycle continues."

How Many Newly Leaked Twitter User Emails Appeared in Prior Breaches?

Source: Troy Hunt, Have I Been Pwned (n=10,000)

About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.