Close Menu
New York Examiner News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    ‘American Idol’ Dedicates First-Ever Taylor Swift Night

    April 28, 2026

    Microsoft researchers have revealed the 40 jobs most exposed to AI—and even teachers make the list

    April 28, 2026

    Melania Trump Slithers To The Bottom And Tries To Get Jimmy Kimmel Fired

    April 28, 2026
    Facebook X (Twitter) Instagram
    New York Examiner News
    • Home
    • US News
    • Politics
    • Business
    • Science
    • Technology
    • Lifestyle
    • Music
    • Television
    • Film
    • Books
    • Contact
      • About
      • Amazon Disclaimer
      • DMCA / Copyrights Disclaimer
      • Terms and Conditions
      • Privacy Policy
    New York Examiner News
    Home»Technology»Why the Twilio Breach Cuts So Deep
    Technology

    Why the Twilio Breach Cuts So Deep

    By AdminAugust 27, 2022
    Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Why the Twilio Breach Cuts So Deep


    The communication company Twilio suffered a breach at the beginning of August that it says impacted 163 of its customer organizations. Out of Twilio’s 270,000 clients, 0.06 percent might seem trivial, but the company’s particular role in the digital ecosystem means that that fractional slice of victims had an outsized value and influence. The secure messaging app Signal, two-factor authentication app Authy, and authentication firm Okta are all Twilio customers that were secondary victims of the breach.

    Twilio provides application programming interfaces through which companies can automate call and texting services. This could mean a system a barber uses to remind customers about haircuts and have them text back “Confirm” or “Cancel.” But it can also be the platform through which organizations manage their two-factor authentication text messaging systems for sending one-time authentication codes. Though it’s long been known that SMS is an insecure way to receive these codes, it’s definitely better than nothing, and organizations haven’t been able to move away from the practice completely. Even a company like Authy, whose core product is an authentication code-generating app, uses some of Twilio’s services.

    The Twilio hacking campaign, by an actor that has been called “0ktapus” and “Scatter Swine,” is significant because it illustrates that phishing attacks can not only provide attackers valuable access into a target network, but they can even kick off supply chain attacks in which access to one company’s systems provides a window into those of their clients.

    “I think this will go down as one of the more sophisticated long-form hacks in history,” said one security engineer who asked not to be named because their employer has contracts with Twilio. “It was a patient hack that was super-targeted yet broad. Pwn the multi-factor authentication, pwn the world.”

    Attackers compromised Twilio as part of a massive, yet tailored phishing campaign against more than 130 organizations in which attackers sent phishing SMS text messages to employees at the target companies. The texts often claimed to come from a company’s IT department or logistics team and urged recipients to click a link and update their password or log in to review a scheduling change. Twilio says that the malicious URLs contained words like “Twilio,” “Okta,” or “SSO” to make the URL and the malicious landing page it linked to seem more legitimate. Attackers also targeted the internet infrastructure company Cloudflare in their campaign, but the company said at the beginning of August that it wasn’t compromised because of its limits on employee access and use of physical authentication keys for logins. 

    “The biggest point here is the fact that SMS was used as the initial attack vector in this campaign instead of email,” says Crane Hassold, director of threat intelligence at Abnormal Security and a former digital behavior analyst for the FBI. “We’ve started to see more actors pivoting away from email as initial targeting and as text message alerts become more common within organizations it’s going to make these types of phishing messages more successful. Anecdotally, I get text messages from different companies I do business with all the time now, and that wasn’t the case a year ago.”



    Original Source Link

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Email Reddit Telegram
    Previous ArticleMucus has evolved at least 15 times in mammals
    Next Article Read the redacted document the federal government used to convince a judge to issue a warrant to seize documents from Mar-a-Lago. It lays out why the government felt there was probable cause that crimes had been committed.

    RELATED POSTS

    Drizzle on top: a new high-end dog food brand is coming for the 1%

    April 28, 2026

    The M5 MacBook Air Has Never Been Cheaper

    April 27, 2026

    Meta inks deal for solar power at night, beamed from space

    April 27, 2026

    ‘STAGED’: Conspiracy Theories Are Everywhere Following White House Correspondents’ Dinner Shooting

    April 26, 2026

    Anthropic created a test marketplace for agent-on-agent commerce

    April 26, 2026

    Best Apps for Focus (2026): Focus Friend, Forest, Focus Traveller

    April 25, 2026
    latest posts

    ‘American Idol’ Dedicates First-Ever Taylor Swift Night

    American Idol entered its Taylor Swift era on Sunday night (April 27), with the remaining…

    Microsoft researchers have revealed the 40 jobs most exposed to AI—and even teachers make the list

    April 28, 2026

    Melania Trump Slithers To The Bottom And Tries To Get Jimmy Kimmel Fired

    April 28, 2026

    Experimental drug doubles survival in metastatic pancreatic cancer trial

    April 28, 2026

    Drizzle on top: a new high-end dog food brand is coming for the 1%

    April 28, 2026

    A Brain Implant for Depression Is About to Be Tested in Humans

    April 28, 2026

    Tony Leung Named Jury President of 2026 Shanghai Film Festival

    April 28, 2026
    Categories
    • Books (1,210)
    • Business (6,113)
    • Events (49)
    • Film (6,050)
    • Lifestyle (4,151)
    • Music (6,165)
    • Politics (6,112)
    • Science (5,467)
    • Technology (6,044)
    • Television (5,732)
    • Uncategorized (7)
    • US News (6,102)
    popular posts

    Against ‘Public Health’

    Everything is supposedly a “public health” issue in the US, but this buzzword does little…

    Trump Rips McConnell On The Eve Of Biden Big Win

    August 8, 2022

    Book Riot’s Deals of the Day for February 19, 2026

    February 19, 2026

    Between Myth and Memory: The Beautiful Brutality of “Salt Bones”

    July 22, 2025
    Archives
    Browse By Category
    • Books (1,210)
    • Business (6,113)
    • Events (49)
    • Film (6,050)
    • Lifestyle (4,151)
    • Music (6,165)
    • Politics (6,112)
    • Science (5,467)
    • Technology (6,044)
    • Television (5,732)
    • Uncategorized (7)
    • US News (6,102)
    About Us

    We are a creativity led international team with a digital soul. Our work is a custom built by the storytellers and strategists with a flair for exploiting the latest advancements in media and technology.

    Most of all, we stand behind our ideas and believe in creativity as the most powerful force in business.

    What makes us Different

    We care. We collaborate. We do great work. And we do it with a smile, because we’re pretty damn excited to do what we do. If you would like details on what else we can do visit out Contact page.

    Our Picks

    A Brain Implant for Depression Is About to Be Tested in Humans

    April 28, 2026

    Tony Leung Named Jury President of 2026 Shanghai Film Festival

    April 28, 2026

    Meet Greg Shahade, Polyamorous Chess Master Who Ended Jamie Ding’s 31 Game Streak

    April 28, 2026
    © 2026 New York Examiner News. All rights reserved. All articles, images, product names, logos, and brands are property of their respective owners. All company, product and service names used in this website are for identification purposes only. Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Terms & Conditions and Privacy Policy.

    Type above and press Enter to search. Press Esc to cancel.

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT