Security
Headlines
HeadlinesLatestCVEs

Headline

Nearly 1,900 Signal Messenger Accounts Potentially Compromised in Twilio Hack

Popular end-to-end encrypted messaging service Signal on Monday disclosed the cyberattack aimed at Twilio earlier this month may have exposed the phone numbers of roughly 1,900 users. “For about 1,900 users, an attacker could have attempted to re-register their number to another device or learned that their number was registered to Signal,” the company said. "All users can rest assured that

The Hacker News
#web#The Hacker News

Popular end-to-end encrypted messaging service Signal on Monday disclosed the cyberattack aimed at Twilio earlier this month may have exposed the phone numbers of roughly 1,900 users.

“For about 1,900 users, an attacker could have attempted to re-register their number to another device or learned that their number was registered to Signal,” the company said. “All users can rest assured that their message history, contact lists, profile information, whom they’d blocked, and other personal data remain private and secure and were not affected.”

Signal, which uses Twilio to send SMS verification codes to users registering with the app, said it’s in the process of alerting the affected users directly and prompting them to re-register the service on their devices.

The development comes less than a week after Twilio revealed that data associated with about 125 customer accounts were accessed by malicious actors through a phishing attack that duped the company’s employees into handing over their credentials. The breach occurred on August 4.

In the case of Signal, the unknown threat actor is said to have abused the access to explicitly search for three phone numbers, followed by re-registering an account with the messaging platform using one of those numbers, thereby enabling the party to send and receive messages from that phone number.

As part of the advisory, the company has also urged users to enable registration lock, an added security measure that requires the Signal PIN in order to register a phone number with the service.

Web infrastructure provider Cloudflare, which was also unsuccessfully targeted by the sophisticated phishing scam, said the use of physical security keys issued to every employee helped it impede the attack.

Phishing and other types of social engineering rely on the human factor to be the weakest link in a breach. But the latest incident also serves to highlight that third-party vendors pose as much a risk to companies.

The development further underscores the dangers of relying on phone numbers as unique identifiers, what with the technology susceptible to SIM swapping that allows bad actors to carry out account takeover attacks and illicit money transactions.

Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

The Hacker News: Latest News

New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration