GearriceGearrice
  • Tech World
  • Mobile Zone
  • Best Deals
  • How to
  • Google
    • Android
  • Brands
    • Apple
      • iPhone
      • iPad
      • Apple Watch
      • AirPods
      • AirTag
      • HomePod
      • Apple TV
      • Mac
        • iMac
        • MacBook
    • Huawei
      • HONOR
    • Xiaomi
      • POCO
      • Redmi
    • OPPO
      • Realme
      • Vivo
        • iQOO
      • OnePlus
    • Samsung
    • Motorola
    • Nokia
    • Philips
    • Sony
    • Lenovo
    • Intel
    • Microsoft
      • Windows
    • Disney
    • Xbox
    • Nintendo
  • Tesla
    • SpaceX
  • Smart Home
  • Social Media
    • Facebook
    • Instagram
    • Twitter
    • WhatsApp
    • YouTube
    • TikTok
    • Spotify
Facebook Twitter Instagram
Facebook Twitter Instagram Pinterest
Gearrice Gearrice
Subscribe
  • Mobile Zone
  • Tech World
  • Best Deals
  • Smart Home
GearriceGearrice
Home»Tech World»Twitter, GitHub, AWS… thousands of apps are leaking your account keys

Twitter, GitHub, AWS… thousands of apps are leaking your account keys

By Rowan Britto04/08/20222 Mins Read
Share
Facebook Twitter LinkedIn Pinterest
Hacking of online accounts like those of Twitter users is common. We generally advise Internet users to make their password very tough and to activate two-factor authentication to limit the risks as much as possible. However, we must not ignore the other great danger too often underestimated by users: third-party applications connected to your account.

In a report, CloudSEK researchers reveal that 3207 mobile applications leak all or part of the Twitter API keys. The problem is that these software keys can allow you to take control of your Twitter account without even knowing your username or password. These keys and access tokens generated for each application also make it possible to bypass two-factor authentication.

How Vulnerabilities in 3200+ Mobile Apps Help Hackers Steal Your Twitter Account (and More)

According to CloudSEK, the technique is actively used by hackers, especially those trying to create huge botnets to carry out large-scale attacks – as well as conduct effective disinformation campaigns. The firm explains that hackers are likely to integrate all the keys and tokens collected into a program allowing the massive spread of malware through verified Twitter accounts.

In addition to Twitter, CloudSEK researchers say many applications leak other API keys and access tokens, including those from GitHub, Amazon Web Services (AWS), HubSpot, and Razorpay. The researchers give several tips for developers to plug these sensitive data leaks. Like for example the fact of using variables instead of using this data directly.

Read also – Twitter – the hacked data of 5.4 million users on sale, are you concerned?

For their part, users are invited to regularly review the list of applications connected to their Twitter account (and to their other online accounts). On Twitter, you have to go to the Settings > Security > Apps & Sessions > Connected Apps. Feel free to remove any app you don’t use or recognize. In the worst case, the application in question will ask you again to associate your account.

Related Posts

Elon Musk will receive key documents to calculate the number of Twitter accounts. What for?

Microsoft employees leak their passwords on GitHub

Never Get Bored Again: 7 Sudoku Apps to Play Anywhere

Add A Comment

Leave a Reply Cancel reply

Featured
Tech World

HOW TO BUY BUDGET PROCESSORS

By gearrice17/08/20220
Tech World

Google to add AI language skills to Alphabet’s assistant robot

By Vivek Rana18/08/20220

Technology News Desk !!! Google’s parent company Alphabet is bringing two of its most ambitious…

Android

Russian hackers hide behind fake accounts

By Elizabeth George18/08/20220

As a social network dedicated to the professional world, LinkedIn remains a prime target for…

Tech World

Tricks so that your cat does not climb on the kitchen or bathroom countertops

By Arthur Morgan18/08/20220

Cats are not as “forgiving” as dogs. Is there any way to prevent them from…

Tech World

How to change your Apple ID: step-by-step guide

By Ronan Byrne18/08/20220

If you’ve been in the Apple ecosystem for years, chances are your Apple ID has…

Gearrice
Facebook Twitter Instagram Pinterest
  • Contact us
  • Write For Us
  • Terms and Conditions
© 2022 Gearrice.

Type above and press Enter to search. Press Esc to cancel.