Twitter says many leaked passwords inaccurate, duplicates
Many accounts were used for spamming and have been suspended, Twitter said
IDG News Service - Many of the Twitter logins and passwords leaked on the web this week are either inaccurate or belong to accounts already suspended for spamming, the company said late Tuesday.
The logins and passwords were published Monday on Pastebin, a website intended for programmers to share code but favored by hackers to release stolen data. The data was published on five separate posts on Pastebin, comprising a total of 58,978 login and password combinations.
"We've discovered that the list of alleged accounts and passwords found on Pastebin consists of more than 20,000 duplicates, many spam accounts that have already been suspended and many login credentials that do not appear to be linked," Twitter said via email. "The password and username are not actually associated with each other."
Some users will be asked to reset their passwords, while other users who are worried their data may be compromised are encouraged to change their passwords, the spokesman said.
The data was posted by an anonymous Pastebin user. As of Tuesday evening, the first page of the information had more than 40,000 views, according to a counter.
Send news tips and comments to email@example.com
- Path Selection Infographic Path Selection Infographic
- Hyperconvergence Infographic A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users? All Cybercrime and Hacking White Papers | Webcasts