Twitter is claiming to have resolved a bug that allowed a group of London-based security researchers to post unauthorised tweets to the accounts of British celebrities and journalists. But the hackers who initially disclosed the vulnerability says that’s complete rubbish.
A Twitter spokesperson told reporters on Friday that it had “resolved a bug that allowed certain accounts with a connected UK phone number to be targeted by SMS spoofing.” But during a conversation with Gizmodo, the hackers who posted the unauthorised tweets to celebrity accounts appeared to reproduce the experiment after Twitter made its claim.
The Guardian had reported earlier in the day that the bug had been resolved citing the same statement provided to Gizmodo. Pressed for an explanation, Twitter would only say that it is still investigating the matter to ensure its “account security protocols are functioning as expected.”
The hijacking tests are controversial because the account holders, while reportedly notified, did not consent to the experiment, which was carried out by a group called Insinia Security. The group says it was motivated to demonstrate the flaw’s existence with high-profile accounts in order to draw attention to the problem.
Essentially, the flaw allows virtually anyone to post updates to certain SMS-enabled accounts, though it’s unclear how many accounts may be vulnerable. “We do not believe there is any significant risk to US-based account holders,” Twitter’s spokesperson added.
Among the accounts hijacked by the researchers are ones belonging to broadcaster Eamonn Holmes and documentary filmmaker Louis Theroux.
“If we can text from what appears to be your number then we can interact with, and fully control, your Twitter account”
The method used involves sending text messages to Twitter containing commands while spoofing a user’s phone number. Unbeknownst to many users, a Twitter account can accept commands via text message, provided the user knows where to send them. The numbers used vary from country to country and come in two forms: A longcode, which looks like a normal phone number, and a shortcode, which is typically three to five digits long.
To wit, the longcode assigned to the UK, where Insinia performed its tests, is +447624800379. The shortcode for US-based users is 40404.
Shortcodes are not available in every country. Prior to a change in 2012, longcodes could be used by anyone in any country, even if its prefix contained a foreign dial-out code (also known as “country codes”).
There are numerous apps available online that can be used to “spoof” a phone number, though doing so may be illegal without consent. Spoofing a number allows someone to sending messages or making calls that deceptively appear to originate from another person’s phone.
After uncovering which phone numbers were used by various celebrities to control their Twitter accounts, it appears the hackers were able to spoof those numbers and transmit commands using one of Twitter’s longcodes.
“If we can text from what appears to be your number then we can interact with, and fully control, your Twitter account,” Insinia Security said in a now-deleted tweet.
A Twitter spokesperson told Gizmodo and other outlets, “We’ve resolved a bug that allowed certain accounts with a connected UK phone number to be targeted by SMS spoofing. We’ll continue to investigate any related reports to ensure our account security protocols are functioning as expected.”
During a private chat with Gizmodo, however, the hackers appeared to reproduce their experiment, forcing an account belonging to the head of a London-based financial technology company to retweet a tweet from the BBC. Insinia said it verified the flaw remained using “a number of accounts.”
In 2012, Twitter acknowledged a vulnerability that allowed hackers to perform these types of attacks but said certain accounts were immune; namely, accounts based in the US where a shortcode had been assigned. At the time, there was no shortcode for users in the UK interested in sending SMS-based commands.
In response to the issue, Twitter rolled out a PIN code system for users who’d signed up for the service using a longcode. This security measure was not necessary for users in countries that had shortcodes, the company said. It took the additional step of disabling the ability to use longcodes in countries where a shortcode was available.
At some point, the UK did enable multiple Twitter shortcodes, so it’s unclear why a longcode even still works with UK-based accounts.
Insinia said that so far its spoofing experiment only worked on accounts when it used a longcode to transmit the commands. It follows, then, that again disabling the use of longcodes wherever possible would likely solve this problem. Insinia told Gizmodo, however, that it is currently investigating whether there’s a method for hijacking accounts that can only receive commands via shortcode.
We’ll update with additional information as Twitter provides it.
Featured image: AP