1 min read

Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach

Silviu STAHIE

August 09, 2022

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Sophisticated Smishing Attack on Twilio Leads to Employee Credential Leak and Data Breach

Unknown hackers managed to trick several Twilio employees into providing their credentials, offering the criminals a way into the infrastructure, the company has disclosed.

Bypassing a company's security measures is difficult, especially if everything is protected and up to date. Unfortunately, all that hard work to secure the network infrastructure goes out the window when workers fall prey to phishing. Basically, employees willingly give direct access to hackers.

"On August 4, 2022, Twilio became aware of unauthorized access to information related to a limited number of Twilio customer accounts through a sophisticated social engineering attack designed to steal employee credentials," said the company.

"This broad based attack against our employee base succeeded in fooling some employees into providing their credentials. The attackers then used the stolen credentials to gain access to some of our internal systems, where they were able to access certain customer data."

The attackers sent SMS text messages to current and former employees of Twilio, purportedly from the IT department. People were informed that their passwords had expired or that the schedule had changed.

"The URLs used words including ‘Twilio,’ ‘Okta,’ and ‘SSO’ to try and trick users to click on a link taking them to a landing page that impersonated Twilio's sign-in page," the company added.

Of course, victims were redirected to a fake Twilio sign-in page, handing the actual credentials to the hackers. Moreover, the attack seemed unusually sophisticated, as the attackers had a way to match employee names from sources with their phone numbers.

With the newly gained access, attackers accessed a limited volume of account data, and the company is now notifying potential victims. The investigation is still ongoing, and Twilio says other companies have suffered the same problems.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read