Wednesday, February 8, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Twilio reveals another data breach

Twilio reveals another data breach

Twilio has completed its investigation and confirmed that the data breach incident in August was not the first one.


Erdem Yasar Erdem Yasar
October 28, 2022
3 min read
Twilio reveals another data breach
  • Twilio announced that in mid-July 2022, malicious actors sent hundreds of smishing text messages to the mobile phones of current and former Twilio employees.
  • The threat actors managed to compromise user credentials by leading them to fake pages hosted on domains created by malicious actors.
  • The investigation unveils that 209 customers and 93 Authy end users had accounts that were impacted by the incident.

In late summer, Twilio announced a data breach incident that caused attackers to steal customer information data from the company. The company has finally wrapped up its investigation and published a final update to the blog post. According to the final announcement, it was not the first time that the same threat actors managed to steal data.

SMS phishing

According to the announcement, in mid-July 2022, actors sent hundreds of SMS phishing, also known as Smishing, messages to current and former employees. The attackers impersonating the Twilio IT team or other administrators urged employees to click on a link, which looks like a pass-reset link. The links that lead to fake pages were hosted on domains such as twilio-sso.com, twilio.net, twilio.org, sendgrid-okta.org, twilio-okta.net, and twilio-okta.com.

After some employees entered their credentials on these fake websites, those credentials were acquired by actors and used to access internal Twilio administrative tools and applications to access certain customer information. Those actors likely were responsible for a security incident occured on June 29. In that incident, an employee was socially engineered through voice phishing to provide their credentials, and the malicious actor was able to access customer contact information for a limited number of customers.

The company managed to identify and eradicate the threat actors within 12 hours and notified the customers whose information was impacted by the June incident on July 2. The investigation into the Smishing Incident found the following:

  • The last observed unauthorized activity in our environment was on August 9, 2022;
  • 209 customers, out of a total customer base of over 270,000, and 93 Authy end users, out of approximately 75 million total users, had accounts that were impacted by the incident; and
  • There is no evidence that the malicious actors accessed Twilio customers’ console account credentials, authentication tokens, or API keys.

Upon discovering the unauthorized access to our systems, Twilio took a number of actions to eradicate the malicious actor’s access during the Smishing Incident, including:

  • Resetting credentials of the compromised Twilio employee user accounts;
  • Revoking all active sessions associated with the compromise of Okta-integrated apps;
  • Blocking all indicators of compromise associated with the attack; and
  • Initiating takedown requests of the fake Twilio domains.

To prevent or mitigate the efficacy of similar smishing and vishing attacks in the future, Twilio has also implemented a number of additional security measures, including:

  • Implementing stronger two factor precautions and distributing FIDO2 tokens to all employees;
  • Implementing additional layers of control within our VPN;
  • Removing and limiting certain functionality within specific administrative tooling;
  • Increasing the refresh frequency of tokens for Okta-integrated applications;
  • Conducting supplemental mandatory security training for all employees regarding attacks based on social engineering techniques.

Twilio said,

« We’d like to apologize to our customers for the incidents. We have talked to hundreds of customers, conveyed our regrets, and described our ongoing efforts to improve. We deeply appreciate the understanding and support that customers have shown, and we’ve shared our commitment to do better. We are seeing immediate benefits from the significant enhancements we have made to our security posture, and are making long term investments to continue to earn back the trust of our customers. »

See more Cybersecurity News


Tags: Twilio
Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7 News. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7 News, Erdem was the managing editor of T3 Magazine.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
How to take a screenshot in Chrome

How to take a screenshot in Google Chrome

Related News

CISA publishes VMware ESXi ransomware recovery tool

CISA publishes VMware ESXi ransomware recovery tool

February 8, 2023 3:45 pm
New local privilege escalation vulnerability strikes X.Org server

New local privilege escalation vulnerability strikes X.Org server

February 7, 2023 9:45 pm
Red Hat brings new security capabilities to Red Hat OpenShift

Red Hat brings new security capabilities to Red Hat OpenShift

February 7, 2023 8:55 pm
Cisco fixes command injection vulnerability

Cisco fixes command injection vulnerability

February 6, 2023 5:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • CISA publishes VMware ESXi ransomware recovery tool
  • WordPress 6.2 Beta is ready for testing
  • New local privilege escalation vulnerability strikes X.Org server
  • Red Hat brings new security capabilities to Red Hat OpenShift
  • With BuddyPress 12.0, BP Rewrites will support backward compatibility

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.