{"id":1258,"date":"2013-02-22T12:03:37","date_gmt":"2013-02-22T17:03:37","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1258"},"modified":"2020-02-26T18:56:12","modified_gmt":"2020-02-26T14:56:12","slug":"attackers-steal-email-addresses-of-twitter-tumblr-and-pinterest-users","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/attackers-steal-email-addresses-of-twitter-tumblr-and-pinterest-users\/1258\/","title":{"rendered":"Attackers Steal Email Addresses of Twitter, Tumblr and Pinterest Users"},"content":{"rendered":"<p>Social networks have become major targets for attackers, who value the implied trust that users have in their friends\u2019 accounts. Compromising a large number of accounts on one of the major networks can be a major boon. The latest evidence of attackers\u2019 interest in these networks came this week when a customer-support portal that works with Twitter, <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/pinterest-temporarily-locking-down-compromised-accounts-072012\" target=\"_blank\" rel=\"noopener nofollow\">Pinterest<\/a> and <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/tumblr-users-should-beware-cookie-thieves-061112\" target=\"_blank\" rel=\"noopener nofollow\">Tumblr<\/a> was compromised and emails belonging to customers of those companies were stolen.<\/p>\n<p>All three companies sent out emails to affected customers, notifying them of the incident and warning that their email addresses may have been compromised. Officials at Zendesk, an online support portal, posted a notice on the company\u2019s blog with the heading \u201cWe\u2019ve been hacked\u201d. The <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/zendesk-compromised-twitter-tumblr-and-pinterest-users-affected-022213\" target=\"_blank\" rel=\"noopener nofollow\">Zendesk hack<\/a> notice says that the company became aware of the attack on its network sometime this week.<\/p>\n<p>\u201cOur ongoing investigation indicates that the hacker had access to the support information that three of our customers store on our system. We believe that the hacker downloaded email addresses of users who contacted those three customers for support, as well as support email subject lines. We notified our affected customers immediately and are working with them to assist in their response,\u201d Mikkel Svane, the Zendesk CEO, wrote in the blog post.<\/p>\n<p>Svane did not identify the customers that were affected, but Twitter, Tumblr and Pinterest, three of the larger social networks, all sent notification emails to their users in the last 24 hours. The message Twitter sent to affected users said that information compromised in the attack could include users\u2019 emails, phone numbers and Twitter usernames.<\/p>\n<div class=\"pullquote\">The message Twitter sent to affected users said that information compromised in the attack could include users\u2019 emails, phone numbers and Twitter usernames.<\/div>\n<p>\u201cTwitter\u2013along with a number of other companies\u2013uses a customer support portal called Zendesk. Zendesk recently blogged about a significant security breach. In order to ensure those who may be impacted by this breach are notified as quickly as possible, we are sending this notification to all email addresses, including this one, that we believe could have been involved,\u201d the Twitter email notification says.<\/p>\n<p>Security experts say that maintaining <a href=\"https:\/\/me-en.kaspersky.com\/blog\/ask-expert-stefan-tanase\/\" target=\"_blank\" rel=\"noopener\">security on social networks<\/a> can be difficult, but there several key things users can do to protect themselves. First, never reuse passwords from one account ot another. If an attacker gets access to your Twitter password, for example, is you\u2019ve reused that password on other sites, the danger of the attack is multiplied several times. Second, avoid using your normal personal email address as a registration credential for these services. Use a disposable email address or one from a free webmail provider such as Yahoo and use it only for the purpose of registering for such networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social networks have become major targets for attackers, who value the implied trust that users have in their friends\u2019 accounts. Compromising a large number of accounts on one of the<\/p>\n","protected":false},"author":32,"featured_media":1259,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[312,311,313],"class_list":{"0":"post-1258","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-attack","9":"tag-email-address","10":"tag-social-platforms"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/attackers-steal-email-addresses-of-twitter-tumblr-and-pinterest-users\/1258\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/attackers-steal-email-addresses-of-twitter-tumblr-and-pinterest-users\/1258\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/attackers-steal-email-addresses-of-twitter-tumblr-and-pinterest-users\/1258\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/attackers-steal-email-addresses-of-twitter-tumblr-and-pinterest-users\/1258\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/attackers-steal-email-addresses-of-twitter-tumblr-and-pinterest-users\/1258\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/attackers-steal-email-addresses-of-twitter-tumblr-and-pinterest-users\/483\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/attackers-steal-email-addresses-of-twitter-tumblr-and-pinterest-users\/1258\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/attackers-steal-email-addresses-of-twitter-tumblr-and-pinterest-users\/1258\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/attack\/","name":"attack"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1258"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1258\/revisions"}],"predecessor-version":[{"id":15478,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1258\/revisions\/15478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1259"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}