Hackers hacked 5.4 million Twitter accounts

Hackers are at it again! This time, a database holding the email addresses and phone numbers of over 5.4 million Twitter users was hacked by a malicious party. Read on to find out details about the hackers’ tactics, what happened in the attack, and what Twitter is doing to protect its users.

The case

An unknown hacker hacked into Twitter’s servers through a vulnerability that the service has since patched, gaining access to a database containing the email addresses and phone numbers of 5.4 million users. The database was quickly uploaded to the dark web, and the hacker wanted to sell it for $30,000.

About Twitter

Twitter has over 320 million monthly active users! That’s a lot of people using Twitter to connect with friends, family, and their favorite brands. But what exactly is Twitter? And how can you use it to connect with the people and things you care about?

Twitter
Twitter

Twitter is a real-time information network that connects you to the latest stories, ideas, opinions, and news about what you find interesting. Simply put: Twitter is what’s happening right now.

People use Twitter to stay informed about current events, discover breaking news, and get real-time updates on topics ranging from politics and sports to entertainment and food. Joining conversations on Twitter is easy – all you need is an account.

With over 320 million monthly active users, Twitter is one of the most popular social networking platforms. Whether you’re looking to stay informed about current events, discover breaking news, or get real-time updates on your favorite topics, joining conversations on Twitter is easy – all you need is an account.

Conclusion

Although Twitter has patched the vulnerability that allowed this hacker to gain access to their database, the damage has already been done. The database containing the email addresses and phone numbers of 5.4 million users has already been uploaded to the dark web, and it is unknown how many people will end up with this information. At this point, users can be vigilant about any suspicious activity on their accounts and change their passwords as soon as possible.