A security researcher was able to use a bug in the Twitter Android app to identify millions of Twitter users, connecting their phone numbers to their Twitter IDs. The exploit could expose failures in the company’s two-factor authentication system and give other security developers pause.
“If you upload your phone number, it fetches user data in return,” he said.
The user data allowed Balic to find phone numbers for many major Twitter “celebrities” including the private number of a “senior Israeli politician.”
“Upon learning of this bug, we suspended the accounts used to inappropriately access people’s personal information. Protecting the privacy and safety of the people who use Twitter is our number one priority and we remain focused on rapidly stopping spam and abuse originating from use of Twitter’s APIs,” a Twitter spokesperson said.
The bug exposed user accounts when Balic uploaded millions of phone numbers and asked Twitter to match them with users. Typically this interface is used only when new users install the app on their phone but, using a set of API calls, Balic was able to spoof this behavior. The resulting breach of privacy – essentially connecting real numbers to real Twitter handles – could reduce the efficacy of two-factor authentication schemes popular on financial applications and wallets.