Twilio Hacked After Employees Tricked Into Giving Up Login Credentials By Orbit Brain August 8, 2022 0 303 viewsCyber Security News Residence › CyberwarfareTwilio Hacked After Workers Tricked Into Giving Up Login CredentialsBy Ryan Naraine on August 08, 2022TweetEnterprise software program vendor Twilio (NYSE: TWLO) has been hacked by a relentless risk actor who efficiently tricked workers into giving up login credentials that have been then used to steal third-party buyer information.The San Francisco firm fessed as much as the breach in a web-based discover that describes a complicated risk actor with intelligent social engineering expertise and sufficient sources to change carriers for ongoing text-based phishing assaults.Twilio mentioned the assault towards its worker base succeeded in fooling some workers into offering their credentials. “The attackers then used the stolen credentials to realize entry to a few of our inside methods, the place they have been in a position to entry sure buyer information,” Twilio added.The corporate didn’t present particulars on the extent of the breach, what number of clients have been affected, or whether or not the stolen information was encrypted and secured.Twilio, a powerhouse within the enterprise communication API enterprise with 26 workplaces in 17 nations, described the incident as ongoing and warns that the risk actor is refined sufficient to rotate via telco carriers and internet hosting suppliers with social engineering lures.[ READ: Twilio, HashiCorp Among Codecov Supply Chain Hack Victims ]“Based mostly on these elements, we have now purpose to consider the risk actors are well-organized, refined and methodical of their actions,” Twilio mentioned.From the Twilio advisory:“On August 4, 2022, Twilio turned conscious of unauthorized entry to info associated to a restricted variety of Twilio buyer accounts via a complicated social engineering assault designed to steal worker credentials.Extra particularly, present and former workers not too long ago reported receiving textual content messages purporting to be from our IT division. Typical textual content our bodies instructed that the worker’s passwords had expired, or that their schedule had modified, and that they wanted to log in to a URL the attacker controls. The URLs used phrases together with “Twilio,” “Okta,” and “SSO” to try to trick customers to click on on a hyperlink taking them to a touchdown web page that impersonated Twilio’s sign-in web page. The textual content messages originated from U.S. service networks. We labored with the U.S. carriers to close down the actors and labored with the internet hosting suppliers serving the malicious URLs to close these accounts down.[The] risk actors appeared to have refined talents to match worker names from sources with their telephone numbers.”Twilio didn’t point out if the attacker encountered any MFA (multi-factor authentication) roadblocks or if any foundational entry management know-how was bypassed within the social engineer assaults.“We have now heard from different firms that they, too, have been topic to related assaults, and have coordinated our response to the risk actors – together with collaborating with carriers to cease the malicious messages, in addition to their registrars and internet hosting suppliers to close down the malicious URLs,” Twilio mentioned.Nonetheless, regardless of this response, the corporate mentioned the malicious hackers have continued to rotate via carriers and internet hosting suppliers to renew the assaults.Twilio mentioned its safety staff revoked entry to the compromised worker accounts to mitigate the assault and has employed an exterior forensics agency to assist with the investigation.Associated: Uncovered Twilio SDK Abused for Malvertising AssaultAssociated: Twilio Credentials Hardcoded in Cellular Apps Expose Calls, TextsAssociated: Twilio, HashiCorp Amongst Codecov Provide Chain Hack VictimsGet the Day by day Briefing Most LatestMost LearnTwilio Hacked After Workers Tricked Into Giving Up Login Credentials7-Eleven Closes Shops in Denmark After Hacker AssaultMeta Disrupted Two Cyberespionage Operations in South AsiaHYAS Unveils New Device for Steady DNS MonitoringCyberspying Geared toward Industrial Enterprises in Russia and Ukraine Linked to ChinaUS, Australian Cybersecurity Businesses Publish Record of 2021’s High MalwareGreece Flies Russian Cash Launderer to US: LawyerTwitter Breach Uncovered Nameless Account HomeownersGhost Safety Snags $15M Funding for API Safety TechSlack Forces Password Resets After Discovering Software program FlawSearching for Malware in All of the Mistaken Locations?First Step For The Web’s subsequent 25 years: Including Safety to the DNSTattle Story: What Your Pc Says About YouBe in a Place to Act Via Cyber Situational ConsciousnessReport Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant2010, A Nice 12 months To Be a Scammer.Do not Let DNS be Your Single Level of FailureThe best way to Determine Malware in a BlinkDefining and Debating Cyber WarfareThe 5 A’s that Make Cybercrime so EnticingThe best way to Defend Towards DDoS AssaultsSafety Budgets Not in Line with ThreatsAnycast – Three Causes Why Your DNS Community Ought to Use ItThe Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering OrganizationsUtilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise 2FA API security breach credentials customer data data breach data encryption logins MFA Passwords phishing lures ransomware social engineering twilio two-factor authentication Orbit Brainhttp://orbitbrain.com/ Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy waysand much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.
Cisco Patches Severe Vulnerabilities in Nexus DashboardIntroducing the Cyber Security News Cisco Patches Severe Vulnerabilities in Nexus Dashboard.... July 21, 2022 Cyber Security News
Cybersecurity M&A Roundup for October 1-15, 2022Introducing the Cyber Security News Cybersecurity M&A Roundup for October 1-15, 2022.... October 17, 2022 Cyber Security News
iBoot Power Distribution Unit Flaws Allow Hackers to Remotely Shut Down DevicesIntroducing the Cyber Security News iBoot Power Distribution Unit Flaws Allow Hackers to Remotely Shut Down Devices.... September 21, 2022 Cyber Security News
Alleged Chinese Police Database Hack Leaks Data of 1 BillionIntroducing the Cyber Security News Alleged Chinese Police Database Hack Leaks Data of 1 Billion.... July 6, 2022 Cyber Security News
Chinese Hackers Target Energy Firms in South China SeaIntroducing the Cyber Security News Chinese Hackers Target Energy Firms in South China Sea.... August 30, 2022 Cyber Security News
Twitter, Meta Remove Accounts Linked to US Influence Operations: ReportIntroducing the Cyber Security News Twitter, Meta Remove Accounts Linked to US Influence Operations: Report.... August 27, 2022 Cyber Security News