Twitter hacked; 250,000 users must reset their passwords
The company said it has been targeted by hackers this week who may have made off with user names and passwords
IDG News Service - Twitter's servers have been breached by "extremely sophisticated" hackers who may have made off with user names and passwords for about 250,000 users, the company said Friday.
Twitter said unusual access patterns led it to identify the attacks, which took place during the past week.
"We discovered one live attack and were able to shut it down in process moments later. However, our investigation has thus far indicated that the attackers may have had access to limited user information -- usernames, email addresses, session tokens and encrypted/salted versions of passwords -- for approximately 250,000 users," Twitter Director of Information Security Bob Lord said in a blog post.
Twitter reset the passwords and revoked session tokens for the accounts, and said it was emailing the affected users Friday and telling them to reset their passwords.
"This attack was not the work of amateurs, and we do not believe it was an isolated incident," the company said in its post.
It noted that The New York Times and The Wall Street Journal also said they'd been targeted by hackers this week. Those companies said the attacks originated in China, but Twitter did not point to a country of origin.
Twitter said it thinks other companies and organizations have recently been similarly attacked.
It urged all its users to ensure they are using strong passwords on Twitter and elsewhere on the Internet. Passwords should be at least 10 characters and use a mix of upper- and lowercase letters, as well as numbers and symbols, the site said.
"Using the same password for multiple online accounts significantly increases your odds of being compromised," Twitter said. "If you are not using good password hygiene, take a moment now to change your Twitter passwords."
The company said it was still gathering information about the attacks and is working with federal law enforcement agencies to prosecute the attackers.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- IDG Research Survey: Are you Paying Too Much for Your NMS? Feel like you're paying too much for network monitoring? You're not alone. This survey brief summarizes findings from research recently fielded by IDG...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Tips to Simplify Database Administration and Development Make your job easier while getting the most from the leading productivity tool for database professionals. Learn tips from Dell Software's Oracle® ACE,...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How... All Data Center White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!