Timehop Breach: Personal Data of 21 Million Users Compromised

Timehop Faces Major Data Breach: User Information Compromised

In a significant data breach, Timehop, the social media app that curates users’ past posts and photos, has reported a security incident impacting over 21 million users. The breach occurred on July 4th, during which unauthorized individuals gained access to sensitive user data, including names, email addresses, and approximately 4.7 million associated phone numbers.

At its core, Timehop functions as a digital time capsule, aggregating content from platforms like Facebook, Instagram, Twitter, and Foursquare. This allows users to revisit their memories from exactly one year ago. However, the company disclosed on July 7th that unknown attackers breached its cloud computing environment, a critical artery for its operational infrastructure.

Timehop’s investigation revealed that the breach was ongoing when it was detected, enabling the company to intervene but not before some data was compromised. The company stated in a security advisory that initial access was gained through compromised credentials, highlighting a vulnerability in their security practices. The lack of two-factor authentication (2FA) further exacerbated the situation, allowing attackers to exploit this lapse and infiltrate the cloud environment. This aligns with the MITRE ATT&CK framework under the tactics of Initial Access and Credential Dumping.

Moreover, the attackers also accessed authorization tokens provided by external social media networks. These tokens would allow them to view the social media posts of users without permission. Fortunately, Timehop claims that all compromised tokens were deauthorized shortly after detection of the breach, mitigating the potential for unauthorized access to user accounts. The company reassured its users that there is currently no evidence suggesting that these tokens were utilized for further breaches.

Despite the significant volume of affected accounts, Timehop asserted that there remains no evidence of unauthorized access to private messages or sensitive financial information. The organization emphasized that user data pertaining to private communications, such as messages on Facebook Messenger or Twitter, were not exposed in this incident.

In a proactive response, Timehop implemented a system-wide multifactor authentication protocol to bolster its security measures moving forward. Additionally, all users were logged out of the app, requiring them to re-authenticate their accounts to generate fresh authorization tokens.

The company is coordinating with local and federal law enforcement along with social media providers as part of its response to the incident. Timehop has also engaged GDPR experts to communicate effectively with its European users who may have been affected, as the new privacy regulations mandate transparency in breaches that could risk user rights.

To further understand this incident, Timehop has published a technical report detailing the breach and the steps being taken to enhance security. Business owners and stakeholders must remain vigilant as this event underscores the importance of rigorous security protocols, continual monitoring, and user education on data privacy measures.

In summary, the Timehop incident reflects a broader trend of escalating cyber threats targeting personal data. As organizations navigate the complexities of cybersecurity, the lessons from this breach serve as a critical reminder of the need for comprehensive approaches to protecting sensitive information against evolving threats.

Source link