728 x 90

Twitter denies system breach for leaked passwords

Twitter denies system breach for leaked passwords
Twitter denies system breach for leaked passwords

Tens of millions of stolen Twitter credentials evidently lifted from web browser programs were put up for sale online, according to a search engine devoted to leaked data.

Twitter on Thursday was adamant that its computer systems had not been broken into by hackers, and that it was not the source of any account information being hawked on the Internet.

We have investigated reports of Twitter usernames/passwords on the dark web, and we're confident that our systems have not been breached.


“We are confident that these usernames and credentials were not obtained by a Twitter data breach -- our systems have not been breached,” a Twitter spokesperson said in an email reply to an AFP inquiry. Later, Twitter also publish a blog post outlines precautionary measure to keep your account from being compromised.

“In fact, we’ve been working to help keep accounts protected by checking our data against what’s been shared from recent other password leaks.”

According to LeakedSource.com, tens of millions of Twitter credentials are being traded on the “dark web,” a section of the Internet accessed by special software.


The data set reportedly contained more than 32 million Twitter records that could include information such as usernames, passwords, or email addresses.

LeakedSource said in a blog post that it got a copy of the data set, and noted that it was Twitter users who were evidently hacked and not the San Francisco-based one-to-many messaging service.

It appeared that hackers got the information by using malicious code that steals data from web browsing programs.

LeakedSource described itself as a search-engine capable of searching over 1.8 billion leaked records gathered “over a relatively short period of time through a combination of deep-web scavenging and rumor-chasing.”

Write Comment

Your email address will not be published. Required fields are marked with *