Twitter hacked; 250,000 users must reset their passwords
The company said it has been targeted by hackers this week who may have made off with user names and passwords
IDG News Service - Twitter's servers have been breached by "extremely sophisticated" hackers who may have made off with user names and passwords for about 250,000 users, the company said Friday.
Twitter said unusual access patterns led it to identify the attacks, which took place during the past week.
"We discovered one live attack and were able to shut it down in process moments later. However, our investigation has thus far indicated that the attackers may have had access to limited user information -- usernames, email addresses, session tokens and encrypted/salted versions of passwords -- for approximately 250,000 users," Twitter Director of Information Security Bob Lord said in a blog post.
Twitter reset the passwords and revoked session tokens for the accounts, and said it was emailing the affected users Friday and telling them to reset their passwords.
"This attack was not the work of amateurs, and we do not believe it was an isolated incident," the company said in its post.
It noted that The New York Times and The Wall Street Journal also said they'd been targeted by hackers this week. Those companies said the attacks originated in China, but Twitter did not point to a country of origin.
Twitter said it thinks other companies and organizations have recently been similarly attacked.
It urged all its users to ensure they are using strong passwords on Twitter and elsewhere on the Internet. Passwords should be at least 10 characters and use a mix of upper- and lowercase letters, as well as numbers and symbols, the site said.
"Using the same password for multiple online accounts significantly increases your odds of being compromised," Twitter said. "If you are not using good password hygiene, take a moment now to change your Twitter passwords."
The company said it was still gathering information about the attacks and is working with federal law enforcement agencies to prosecute the attackers.
- Hadoop for Dummies Today, organizations in every industry are being showered with imposing quantities of new information. Along with traditional sources, many more data channels and...
- The Top Five Ways to Get Started with Big Data Despite the increased focus on big data over the past few years, most organizations are still talking about what big data is rather...
- Data Warehouse Augmentation: The Queryable Data Store While organizations have, to date, been busy exploring and experimenting, they are now beginning to focus on using big data technologies to solve...
- The IBM Big Data Platform IBM is unique in having developed an enterprise class big data platform that allows you to address the full spectrum of big data...
- Live Webcast Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>>
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- Best Practices: How to Improve Business Continuity with Virtualization VMware solutions include a range of business continuity capabilities to help ensure availability for applications across your virtualized environment. Learn More>> All Data Center White Papers | Webcasts