{"id":143436,"date":"2022-08-02T18:25:19","date_gmt":"2022-08-02T23:25:19","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/08\/researchers-discover-nearly-3200-mobile-apps-leaking-twitter-api-keys"},"modified":"2022-08-02T18:25:19","modified_gmt":"2022-08-02T23:25:19","slug":"researchers-discover-nearly-3200-mobile-apps-leaking-twitter-api-keys","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/08\/researchers-discover-nearly-3200-mobile-apps-leaking-twitter-api-keys","title":{"rendered":"Researchers Discover Nearly 3,200 Mobile Apps Leaking Twitter API Keys"},"content":{"rendered":"<p style=\"padding-right: 20px\"><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/researchers-discover-nearly-3200-mobile-apps-leaking-twitter-api-keys.jpg\"><\/a><\/p>\n<p>Researchers have reported the discovery of an exoplanet orbiting Ross 508 near the inner edge of its habitable zone.<\/p>\n<hr>\n<p>Researchers have uncovered a list of 3,207 mobile apps that are exposing Twitter API keys in the clear, some of which can be utilized to gain unauthorized access to Twitter accounts associated with them.<\/p>\n<p>The takeover is made possible, thanks to a leak of legitimate Consumer Key and Consumer Secret information, respectively, Singapore-based cybersecurity firm <a href=\"https:\/\/cloudsek.com\/whitepapers_reports\/how-leaked-twitter-api-keys-can-be-used-to-build-a-bot-army\/\" rel=\"noopener\" target=\"_blank\">CloudSEK said in a report<\/a> exclusively shared with The Hacker News.<\/p>\n<p>\u201cOut of 3,207,230 apps are leaking all four authentication credentials and can be used to fully take over their Twitter Accounts and can perform any critical\/sensitive actions,\u201d the researchers said.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers have reported the discovery of an exoplanet orbiting Ross 508 near the inner edge of its habitable zone. Researchers have uncovered a list of 3,207 mobile apps that are exposing Twitter API keys in the clear, some of which can be utilized to gain unauthorized access to Twitter accounts associated with them. The takeover [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,8],"tags":[],"class_list":["post-143436","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-space"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/143436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=143436"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/143436\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=143436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=143436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=143436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}