• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Thousands of Apps Leaking Twitter API Keys

You are here: Home / General Cyber Security News / Thousands of Apps Leaking Twitter API Keys
August 2, 2022

Security researchers have learned more than 3200 mobile applications which are leaking Twitter API keys, probably enabling menace actors to carry out account takeovers.

Twitter APIs allow builders to accessibility the social media application in purchase to embed various bits of its features into their own software – for instance, enabling gaming apps to submit users’ top scores direct to their Twitter account.

Authentication is done by means of keys or tokens. However, CloudSEK located that on several situations, builders with confined security know-how unintentionally remaining those keys embedded in the Twitter API.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


According to the study, they could be abused to complete a vary of delicate steps such as: reading through immediate messages retweeting liking deleting removing followers following accounts and switching exhibit photographs.

CloudSEK explained it uncovered 3207 apps which leaked a valid Client Critical and Buyer Mystery, probably letting destructive actors to establish a large army of bot accounts.

“Sometimes, these qualifications are not taken out right before deploying it in the manufacturing ecosystem. At the time the app gets uploaded to the engage in shop, the API secrets and techniques are there for any individual to obtain,” it defined.

“A hacker can only down load the application and decompile it to get the API qualifications. As a result, from listed here bulk API keys and tokens can be harvested to get ready the Twitter bot military.”

In accordance to the report, this type of Twitter bot could be used to:

  • Spread misinformation globally
  • Run huge-scale malware strategies made to infect compromised account followers
  • Launch spamming campaigns intended to facilitate financial investment fraud
  • Automate phishing developed to enable adhere to-on social engineering strategies

CloudSEK urged builders to conduct standardized code testimonials, ensure information that contains “environment variables” in the supply code are not involved, and rotate API keys.


Some elements of this write-up are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News UK’s Top 10 Universities Failing on DMARC
Next Post: European energy company and gas pipeline hacked by AlphV ransomware european energy company and gas pipeline hacked by alphv ransomware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.