Jump to content
  • 🚀 Join the Uncrowned Addiction Community Today! 🚀

    Say Goodbye to Ads and Hello to Tech Talk!

    👋 Hey there, tech enthusiast! Noticed those pesky ads? Well, we've got great news for you! Sign up for free at Uncrowned Addiction and enjoy an ad-free experience as part of our vibrant tech community.

    Why Join Us?

    • Friendly Community: Connect with fellow tech lovers in a welcoming and supportive environment.
    • Engaging Discussions: From the latest tech trends to timeless tech debates, dive into discussions that matter to you.
    • Share Your Knowledge: Got tech insights or questions? This is your platform to share, learn, and grow.
    • Ad-Free Browsing: Once you're a member, those AdSense ads disappear, making your experience smoother and more enjoyable.

    Becoming part of Uncrowned Addiction means joining a community where your love for technology is shared and celebrated. Sign up now and start your journey with us – where curiosity meets community!

    👉 Join us – it's free, it's fun, and it's all about tech! 👈

  • AdSense Advertisement


  • AdSense Advertisement


  • AdSense Advertisement


Twilio hack investigation reveals second breach, as the number of affected customers rises


Recommended Posts

U.S. messaging giant Twilio confirmed it was hit by a second breach in June that saw cybercriminals access customer contact information.

Confirmation of the second breach — carried out by the same “0ktapus” hackers that compromised Twilio again in August — was buried in an update to a lengthy incident report that Twilio concluded on Thursday.

Twilio said the “brief security incident,” which occurred on June 29, saw the same attackers socially engineer an employee through voice phishing, a tactic whereby hackers make fraudulent phone calls impersonating the company’s IT department in an effort to trick employees into handing over sensitive information. In this case, the Twilio employee provided their corporate credentials, enabling the attacker to access customer contact information for a “limited number” of customers.

“The threat actor’s access was identified and eradicated within 12 hours,” Twilio said in its update, adding that customers whose information was impacted by the June incident were notified on July 2.

When asked by TechCrunch, Twilio spokesperson Laurelle Remzi declined to confirm the exact number of customers impacted by the June breach and declined to share a copy of the notice that the company claims to have sent to those affected. Remzi also declined to say why Twilio has only just disclosed the incident.

Twilio also confirmed in its update that the hackers behind the August breach accessed the data of 209 customers, an increase from 163 customers it shared on August 24. Twilio has not named any of its impacted customers, but some — like encrypted messaging app Signal — have notified users that they were affected by Twilio’s breach. The attackers also compromised the accounts of 93 Authy users, Twilio’s two-factor authentication app it acquired in 2015.

“There is no evidence that the malicious actors accessed Twilio customers’ console account credentials, authentication tokens, or API keys,” Twilio said about the attackers, which maintained access to Twilio’s internal environment for two days between August 7 and August 9, the company confirmed.

The Twilio breach is part of a wider campaign from a threat actor tracked as “0ktapus,” which targeted at least 130 organizations, including Mailchimp and Cloudflare. But Cloudflare said the attackers failed to compromise its network after having their attempts blocked by phishing-resistant hardware security keys.

As part of its efforts to mitigate the efficacy of similar attacks in the future, Twilio has announced that it will also roll out hardware security keys to all employees. Twilio declined to comment on its rollout timeline. The company says it also plans to implement additional layers of control within its VPN, remove and limit certain functionality within specific administrative tooling, and increase the refresh frequency of tokens for Okta-integrated applications.

Twilio hack investigation reveals second breach, as the number of affected customers rises by Carly Page originally published on TechCrunch

View the full article

Link to comment
Share on other sites

AdSense Advertisement


Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • AdSense Advertisement


  • AdSense Advertisement


  • AdSense Advertisement


×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.