Story image

Twitter password glitch showcases 'extreme jumpiness' in digital sector

07 May 18

More than 330 million Twitter users are being urged to change their passwords after an internal system glitch caused the passwords to be exposed in a log file.

Twitter is careful to state that there is no evidence the passwords were stolen, left the company’s systems or misused in any way, but issued the warning to change passwords as a precaution.

“When you set a password for your Twitter account, we use technology that masks it so no one at the company can see it. We recently identified a bug that stored passwords unmasked in an internal log,” an email to users states.

The bug was due to a problem with password hashing. The process wrote passwords to an internal log before they were hashed.

“We mask passwords through a process called hashing using a function known as bcrypt, which replaces the actual password with a random set of numbers and letters that are stored in Twitter's system. This allows our systems to validate your account credentials without revealing your password. This is an industry standard,” the company says.

The incident comes as World Password Day was celebrated to raise awareness about the importance of password security.

Commenting on the incident, GlobalData’s service director of Global Telecom Consumer Services, Platforms and Devices, Emma Mohr-McClune, says:

“The episode is symptomatic of the extreme jumpiness in the digital industry sector right now. No one can afford another data breach scandal.  It also points to the need for social media platform leadership to think through their public communications and password change recommendation processes for all vulnerability scenarios.” 

“The fact that it existed at all triggered the kind of mass security warning most digital communications providers would prefer not to have to deliver at all, especially not while the Facebook data privacy scandal is still ongoing,” Mohr-McClune concludes.

Twitter says there are steps users can take to keep their accounts safe.  

1. Change your password on Twitter and on any other service where you may have used the same password.

2. Use a strong password that you don't reuse on other services.

3. Enable login verification, also known as two factor authentication. This is the single best action you can take to increase your account security.

4. Use a password manager to make sure you're using strong, unique passwords everywhere.

“We are very sorry this happened. We recognise and appreciate the trust you place in us, and are committed to earning that trust every day,” Twitter concludes.

What MSPs can learn from Datto’s Channel Ransomware Report
While there have been less high profile attacks making the headlines, the frequency of attacks is, in fact, increasing.
Cisco expands security capabilities of SD­-WAN portfolio
Until now, SD-­WAN solutions have forced IT to choose between application experience or security.
AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
Bitdefender announces security integration with Kaseya
The new partnership will allow VSA by Kaseya’s cloud and on-premises users to deploy and manage security with Bitdefender Cloud Security for MSPs.
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.