Sunday, December 29, 2024
Advertisement
  1. You Are At:
  2. News
  3. Business
  4. Twitter, Washington Post targeted by hackers

Twitter, Washington Post targeted by hackers

New York, Feb 3: Social media giant Twitter is among the latest U.S. companies to report that it is among a growing list of victims of Internet security attacks, saying that hackers may have gained

India TV News Desk Published : Feb 03, 2013 8:52 IST, Updated : Feb 03, 2013 13:15 IST

Reached on Saturday, Twitter spokesman Jim Prosser had no further comment.

Based on the few details released about the Twitter and Washington Post attacks it's hard to say whether Chinese hackers were involved, said Rich Mogull, CEO of Securosis, an independent security research and advisory firm. There are certain pieces of malicious software that are characteristic to Chinese hackers, he said, but "the problem is not enough has been made public."

One theory is that the Twitter hack happened after an employee's home or work computer was compromised through vulnerabilities in Java, a commonly used computing language whose weaknesses have been well publicized. Independent privacy and security researcher Ashkan Soltani said such a move would give attackers "a toehold" in Twitter's internal network, potentially allowing them either to sniff out user information as it traveled across the company's system or break into specific areas, such as the authentication servers that process users' passwords.



The relatively small number of users affected suggests that attackers weren't on the network long or that they were only able to compromise a subset of the company's servers, Soltani said.

Twitter is generally used to broadcast messages to the public, so the hack might not immediately have yielded any important secrets. But the stolen credentials could be used to eavesdrop on private messages or track which Internet address a user is posting from.

That might be useful, for example, for an authoritarian regime trying to keep tabs on a journalist's movements.

"More realistically, someone could use that as an entry point into another service," Soltani said, noting that since few people bother using different passwords for different services, a password stolen from Twitter might be just as handy for reading a journalist's emails.
Advertisement

Read all the Breaking News Live on indiatvnews.com and Get Latest English News & Updates from Business

Advertisement
Advertisement
Advertisement
Advertisement