State-sponsored DDoS Cyber Attack on Twitter

567

Twitter servers tumbled down for several hours last month after they received unusually large volumes of traffic coming from individual IP addresses located in China and Saudi Arabia.

Preliminary investigations reveal that the incident could be the work of state-sponsored hackers. But the social networking website added in its statement that nothing can be concluded as of now.

The incident came into light when the American online social networking services choose to disclose the issue to the world this week via a blog post. It said that it discovered the incident when a team of security experts who were investigating about a security bug that exposed data last month, stumbled upon some facts.

Twitter added in its blog post that last month the support teams received large amounts of traffic from countries like China and Saudi Arabia where the service was operational on a usual note. When they dug deep into the requests they found that the appeals came in from IP addresses located on computers residing in China and Saudi Arabia and were found to be fake.

Note 1- By November 16th, 2018 the bug which could have exposed data such as users’ phone country codes along with the phone numbers were fixed on a perfect note.

While the web service provider isn’t sure of who launched the cyber attack, it has categorized the attack as a distributed denial of service (DDoS) which bombards the computer servers with large volumes of fake traffic generated by Botnets on remote computers operating under the control of hackers.

Note 2- Twitter clearly specified in its latest blog post that no info was exposed by the bug and so all data privacy concerns from users could be put to rest. It further declined to provide any additional info on the issue.

Ad
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security