{"id":73621,"date":"2024-02-05T15:16:25","date_gmt":"2024-02-05T15:16:25","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2024\/02\/05\/twitter-alternative-spouts-a-massive-leak\/"},"modified":"2024-02-05T15:16:25","modified_gmt":"2024-02-05T15:16:25","slug":"twitter-alternative-spouts-a-massive-leak","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2024\/02\/05\/twitter-alternative-spouts-a-massive-leak\/","title":{"rendered":"Twitter alternative spouts a massive leak"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph mb-20 font-fkroman text-18 leading-160 -tracking-1 selection:bg-franklin-20 dark:text-white dark:selection:bg-blurple [&amp;_a:hover]:shadow-highlight-franklin dark:[&amp;_a:hover]:shadow-highlight-blurple [&amp;_a]:shadow-underline-black dark:[&amp;_a]:shadow-underline-white\">Security consultant and Have I Been Pwned creator Troy Hunt has detailed a vulnerability in the API of Spoutible, a social platform that emerged following Elon Musk\u2019s takeover of Twitter, that could allow hackers to take full control of users\u2019 accounts. <\/p>\n<\/div>\n<div>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph mb-20 font-fkroman text-18 leading-160 -tracking-1 selection:bg-franklin-20 dark:text-white dark:selection:bg-blurple [&amp;_a:hover]:shadow-highlight-franklin dark:[&amp;_a:hover]:shadow-highlight-blurple [&amp;_a]:shadow-underline-black dark:[&amp;_a]:shadow-underline-white\">After someone alerted Hunt to the vulnerability, <a href=\"https:\/\/www.troyhunt.com\/how-spoutibles-leaky-api-spurted-out-a-deluge-of-personal-data\/\" target=\"_blank\" rel=\"noopener\">he discovered that hackers could exploit<\/a> Spoutible\u2019s API to obtain a user\u2019s name, username, and bio, along with their email, IP address, and phone number. Spoutible has since addressed the vulnerability, <a href=\"https:\/\/help.spoutible.com\/support\/solutions\/articles\/150000174284-important-security-update\" target=\"_blank\" rel=\"noopener\">writing in a post on its site<\/a> that it didn\u2019t leak decrypted passwords or direct messages, while confirming the \u201cinformation scraped included email addresses and some cell phone numbers.\u201d It invited anyone who still wants to use the service back for a \u201cspecial Pod session\u201d at 1PM ET. Both Spoutible and Hunt recommend that users change their passwords and reset 2FA.<\/p>\n<\/div>\n<div>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph mb-20 font-fkroman text-18 leading-160 -tracking-1 selection:bg-franklin-20 dark:text-white dark:selection:bg-blurple [&amp;_a:hover]:shadow-highlight-franklin dark:[&amp;_a:hover]:shadow-highlight-blurple [&amp;_a]:shadow-underline-black dark:[&amp;_a]:shadow-underline-white\">As mentioned by Hunt, this isn\u2019t entirely uncommon, as seen in similar data-scraping incidents on platforms like <a href=\"https:\/\/www.theverge.com\/2021\/4\/4\/22366822\/facebook-personal-data-533-million-leaks-online-email-phone-numbers\" target=\"_blank\" rel=\"noopener\">Facebook<\/a> and <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trello-api-abused-to-link-email-addresses-to-15-million-accounts\/\" target=\"_blank\" rel=\"noopener\">Trello<\/a>.<\/p>\n<\/div>\n<div>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph mb-20 font-fkroman text-18 leading-160 -tracking-1 selection:bg-franklin-20 dark:text-white dark:selection:bg-blurple [&amp;_a:hover]:shadow-highlight-franklin dark:[&amp;_a:hover]:shadow-highlight-blurple [&amp;_a]:shadow-underline-black dark:[&amp;_a]:shadow-underline-white\">However, Hunt discovered something much more alarming: bad actors could also use the exploit to obtain a hashed version of users\u2019 passwords. While they were protected with bcrypt, short or weak passwords could be fairly easy to decipher, and the service blocked people from setting longer passwords that would be harder to crack. <\/p>\n<\/div>\n<div>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph mb-20 font-fkroman text-18 leading-160 -tracking-1 selection:bg-franklin-20 dark:text-white dark:selection:bg-blurple [&amp;_a:hover]:shadow-highlight-franklin dark:[&amp;_a:hover]:shadow-highlight-blurple [&amp;_a]:shadow-underline-black dark:[&amp;_a]:shadow-underline-white\">And, to top it all off, Hunt found that the API returned the 2FA code used to sign in to someone\u2019s account, as well as the reset tokens generated to help a user change a forgotten password. This could let hackers easily gain access to and hijack someone\u2019s account without alerting them to the breach.<\/p>\n<\/div>\n<div>\n<p class=\"duet--article--dangerously-set-cms-markup duet--article--standard-paragraph mb-20 font-fkroman text-18 leading-160 -tracking-1 selection:bg-franklin-20 dark:text-white dark:selection:bg-blurple [&amp;_a:hover]:shadow-highlight-franklin dark:[&amp;_a:hover]:shadow-highlight-blurple [&amp;_a]:shadow-underline-black dark:[&amp;_a]:shadow-underline-white\">According to Hunt, the exploit exposed the emails of around 207,000 users. That\u2019s nearly everyone on the whole platform, as <a href=\"https:\/\/www.wired.com\/story\/christopher-bouzy-spoutible-race-to-unseat-twitter\/\" target=\"_blank\" rel=\"noopener\">a June 2023 report from <em>Wired<\/em><\/a> indicated Spoutible had 240,000 users.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.theverge.com\/2024\/2\/5\/24061997\/twitter-alternative-spoutible-vulnerabilty\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security consultant and Have I Been Pwned creator Troy Hunt has detailed a vulnerability in the API of Spoutible, a social platform that emerged following Elon Musk\u2019s takeover of Twitter, that could allow hackers to take full control of users\u2019 accounts. After someone alerted Hunt to the vulnerability, he discovered that hackers could exploit Spoutible\u2019s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":73622,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-73621","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/73621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=73621"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/73621\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/73622"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=73621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=73621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=73621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}