A security researcher was able to use a bug in the Twitter Android app to identify millions of Twitter users, connecting their phone numbers to their Twitter IDs. The exploit could expose failures in the companyâs two-factor authentication system and give other security developers pause.
According to a TechCrunch report, the researcher, Ibrahim Balic, created randomized lists of phone numbers and sent them to Twitter.
âIf you upload your phone number, it fetches user data in return,â he said.
The user data allowed Balic to find phone numbers for many major Twitter âcelebritiesâ including the private number of a âsenior Israeli politician.â
âUpon learning of this bug, we suspended the accounts used to inappropriately access peopleâs personal information. Protecting the privacy and safety of the people who use Twitter is our number one priority and we remain focused on rapidly stopping spam and abuse originating from use of Twitterâs APIs,â a Twitter spokesperson said.
The bug exposed user accounts when Balic uploaded millions of phone numbers and asked Twitter to match them with users. Typically this interface is used only when new users install the app on their phone but, using a set of API calls, Balic was able to spoof this behavior. The resulting breach of privacy â essentially connecting real numbers to real Twitter handles â could reduce the efficacy of two-factor authentication schemes popular on financial applications and wallets.
Image via Shutterstock.