• Advertise
  • SS7 Hacking
Saturday, January 28, 2023
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
  • Home
  • Exploits

    Razer Synapse 3.7.0731.072516 Local Privilege Escalation

    Micro Focus GroupWise Session ID Disclosure

    PHPJabbers Car Rental Script 3.0 SQL Injection

    Secure Web Gateway 10.2.11 Cross Site Scripting

    Inout Jobs Portal 2.2.2 Cross Site Scripting

    Inout Jobs Portal 2.2.2 SQL Injection

    Inout Music 5.1.1 SQL Injection

    Cacti 1.2.22 Command injection

    Inout Search Engine 10.1.3 Cross Site scripting

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

    Brave Browser turns your device into a proxy for others via “Snowflake” Feature

    This tool, “telerwaf”, protects go apps from web-based attacks

    Microsoft Patch Tuesday, January 20,23 with 98 Bug Fixes

    Multiple bug fixes released by Qualcomm and Lenovo

    Fortinet Patched Multiple Vulnerabilities In FortiADC And FortiTester

  • Hacking Tools
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    Management of vulnerability with Wazuh Open Source XDR

    Seven Tips for Building a Banking App That is User-Friendly

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    Management of vulnerability with Wazuh Open Source XDR

  • Kali Linux

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    ADFSRelay – Proof of Concept Utilities Developed For Researching NTLM Relaying Attacks Targeting ADFS

    Azure Sentinel protects Kubernetes deployments

    Reconator Automated Recon For Pentesting and Bug Bounty

    Kali Linux (is!) Everywhere

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    PlugX Malware Sneaks Onto Windows PCs Through USB Devices

    PlugX Malware Sneaks Onto Windows PCs Through USB Devices

    Yandex Denies Hack – Source Code Leaked on Popular Hacking Forum

    Yandex Denies Hack – Source Code Leaked on Popular Hacking Forum

    Hackers Abuse Legitimate Remote Monitoring Tools to Steal Banking Data

    Hackers Abuse Legitimate Remote Monitoring Tools to Steal Banking Data

    Hive Ransomware Gang Disrupted; Servers and Dark Web Site Seized

    Hive Ransomware Gang Disrupted; Servers and Dark Web Site Seized

    New Python Malware Targeting Windows Devices

    New Python Malware Targeting Windows Devices

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    New Wave of Cyberattacks Targeting MS Exchange Servers

    New Wave of Cyberattacks Targeting MS Exchange Servers

  • Advertise
  • Home
  • Exploits

    Razer Synapse 3.7.0731.072516 Local Privilege Escalation

    Micro Focus GroupWise Session ID Disclosure

    PHPJabbers Car Rental Script 3.0 SQL Injection

    Secure Web Gateway 10.2.11 Cross Site Scripting

    Inout Jobs Portal 2.2.2 Cross Site Scripting

    Inout Jobs Portal 2.2.2 SQL Injection

    Inout Music 5.1.1 SQL Injection

    Cacti 1.2.22 Command injection

    Inout Search Engine 10.1.3 Cross Site scripting

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

    Brave Browser turns your device into a proxy for others via “Snowflake” Feature

    This tool, “telerwaf”, protects go apps from web-based attacks

    Microsoft Patch Tuesday, January 20,23 with 98 Bug Fixes

    Multiple bug fixes released by Qualcomm and Lenovo

    Fortinet Patched Multiple Vulnerabilities In FortiADC And FortiTester

  • Hacking Tools
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    Management of vulnerability with Wazuh Open Source XDR

    Seven Tips for Building a Banking App That is User-Friendly

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials
    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Monitor Docker containers metrics and other events

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

    Management of vulnerability with Wazuh Open Source XDR

  • Kali Linux

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    ADFSRelay – Proof of Concept Utilities Developed For Researching NTLM Relaying Attacks Targeting ADFS

    Azure Sentinel protects Kubernetes deployments

    Reconator Automated Recon For Pentesting and Bug Bounty

    Kali Linux (is!) Everywhere

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    PlugX Malware Sneaks Onto Windows PCs Through USB Devices

    PlugX Malware Sneaks Onto Windows PCs Through USB Devices

    Yandex Denies Hack – Source Code Leaked on Popular Hacking Forum

    Yandex Denies Hack – Source Code Leaked on Popular Hacking Forum

    Hackers Abuse Legitimate Remote Monitoring Tools to Steal Banking Data

    Hackers Abuse Legitimate Remote Monitoring Tools to Steal Banking Data

    Hive Ransomware Gang Disrupted; Servers and Dark Web Site Seized

    Hive Ransomware Gang Disrupted; Servers and Dark Web Site Seized

    New Python Malware Targeting Windows Devices

    New Python Malware Targeting Windows Devices

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Blank Image Attack: Blank Images Used to Evade Anti-Malware Checks

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    Ticketmaster: Taylor Swift ticket sales disrupted by bot-driven attack

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    U.S. Sues Google for Dominance Over Digital Advertising Technologies

    New Wave of Cyberattacks Targeting MS Exchange Servers

    New Wave of Cyberattacks Targeting MS Exchange Servers

  • Advertise
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
SS7 SMS Intercept SS7 SMS Intercept SS7 SMS Intercept
Home Security

The 400 million Twitter users’ scraped info goes on sale!

by Ineedhack
December 28, 2022
in Security
0
80
SHARES
497
VIEWS
Share on FacebookShare on Twitter
Kripkey Spy Phone Kripkey Spy Phone Kripkey Spy Phone

Hackread.com has seen samples of data that show the information includes top celebrity and political figures such as Salman Khan from Bollywood and Democratic Rep. Alexandria Ocasio–Cortez.

A threat actor claiming to be “Ryushi,” sold more than 400,000,000 Twitter user’s personal information on BreachedForums. This cybercrime forum was created as an alternative to now-seized Raidforums .

Hackread.com has shown that the attached sample data contains usernames, followers, creator dates and creation dates. In some cases, it even includes the phone number.

Also included in the sample data are well-known accounts such as Alexandria Ocasio Cortez (New York Democratic Rep.), Salman Khan, Indian actor, and Brian Krebs, cybersecurity reporter.

. Since you no longer seem to have a large media/comms department, could you respond to the claim that somebody scraped and is selling data from hundreds of millions Twitter accounts? It may not have happened on your behalf, but Twitter needs to know.

— briankrebs (@briankrebs)

Notable is the fact that this latest data breach occurred just one month ago when a hacker accessed the personal and contact information of more online. The Irish authorities are currently both the previous and most recent incidents.

In the threat actor’s post, he stated that data was “scraped through a vulnerability”, but didn’t provide any additional details.

They also openly advised Elon Musk the CEO of social media giant Facebook that the hacker should be purchased directly instead of paying $276 million USD GDPR breach penalties like Facebook. However, it does not indicate a price for the data being sold.

Hackread.com has provided sample data and an analysis of it. (Image credit to ).

The threat actor offered to broker the deal through a middleman. He stated, “After that I will remove the thread and will never sell this information again.” Data will not be sold to any other person, which will prevent a lot celebrities and politicians from Phishing and Crypto scams Sim swapping and Doxxing and other activities that could make users distrust you and slow down the company’s growth.

According to researchers who saw the data, the alleged leak was caused by an API flaw that allowed the threat actor search all email addresses and phone numbers in order to return a profile.

The attack came just months after Twitter had entered into an consent agreement with US Federal Trade Commission, requiring it to keep a program of information and privacy security for the next 20 years.

This agreement ends a federal probe into Twitter’s use phone numbers and email addresses to advertise. They were used to authenticate multi-factor authentication. Twitter was also fined $150 million.

If this data breach was confirmed, it would have a severe impact on Twitter, both socially and financially. The data were still available at the time this article was written.



RELATED NEWS






Tags: android hackingemail hackingfacebook hackshack newshacking newshacking softwarehacking tipshacking toolsinstagram hackiphone hackingjpg exploitsim swapsimswap attackssimswap hacksmartphone hackingsms exploitss7 softwaretik tok hacktwitter hack
Ineedhack

Ineedhack

Next Post

The Most Essential Android Penetration Testing Tools For Pentesters 2023

Sim Swap Software Sim Swap Software Sim Swap Software

Recommended

XNU vm_map_copy_overwrite_unaligned Race Condition

2 weeks ago

This tool, “telerwaf”, protects go apps from web-based attacks

2 weeks ago

Popular News

    • Advertise
    • SS7 Hacking

    ©2017- 2022 Hacking Tutorials

    No Result
    View All Result
    • Home
    • Exploits
    • Hacking News
    • Hacking Tools
    • Hacking Tutorials
    • Kali Linux
    • Security
    • Advertise