{"id":48455,"date":"2022-09-14T14:58:47","date_gmt":"2022-09-14T14:58:47","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/33838\/Mudge-Lack-Of-Access-Data-Controls-Invite-Twitter-Exploitation.html"},"modified":"2022-09-14T14:58:47","modified_gmt":"2022-09-14T14:58:47","slug":"mudge-lack-of-access-data-controls-invite-twitter-exploitation","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/","title":{"rendered":"Mudge: Lack Of Access, Data Controls Invite Twitter Exploitation"},"content":{"rendered":"<div>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2022\/09\/Peter-Zatko.jpg\" alt class=\"wp-image-446385\"><figcaption>Peiter \u201cMudge\u201d Zatko, former head of security at Twitter, testifies at the Senate Judiciary Committee on Sept. 13, 2022, in Washington. Zatko claims that Twitter&#8217;s widespread security failures pose a security risk to user&#8217;s privacy and information and could potentially endanger national security. (Photo by Kevin Dietsch\/Getty Images)<\/figcaption><\/figure>\n<\/div>\n<p>Twitter\u2019s logging, access and data controls are so poor that they practically invite exploitation by hackers, insider threats, disinformation agents and foreign spies, according to former chief information security officer and <a href=\"https:\/\/www.scmagazine.com\/feature\/threat-intelligence\/researchers-warn-of-rosy-security-reports-in-wake-of-twitter-whistleblower-case\" target=\"_blank\" rel=\"noreferrer noopener\">whistleblower Peiter \u201cMudge\u201d Zatko<\/a>.<\/p>\n<p>In testimony to Congress, Zatko, a well-respected information security professional with a decades-long record of advocating for better security policy in the public and private sectors, said Tuesday that after joining Twitter as its CISO in November 2020 and speaking to engineers and employees, he realized the company was \u201cmore than a decade behind industry security standards.\u201d<\/p>\n<p>In particular, Twitter\u2019s data infrastructure is so decentralized that not even leadership knows all the data the company collects or where it\u2019s stored. When he brought those concerns to Twitter\u2019s leadership, he claimed their incentive structure led them to prioritize \u201cprofits over security.\u201d<\/p>\n<p>\u201cFirst, they don\u2019t know what data they have, where it lives, or where it came from and so unsurprisingly, they can\u2019t protect it. That leads to the second problem: employees need to have too much access to too much data on too many systems,\u201d Zatko told the Senate Judiciary Committee.<\/p>\n<p>Additionally, Twitter has repeatedly dealt with foreign governments bribing or enticing employees to hand over user data. In 2019, two employees <a href=\"https:\/\/www.justice.gov\/opa\/pr\/two-former-twitter-employees-and-saudi-national-charged-acting-illegal-agents-saudi-arabia\" target=\"_blank\" rel=\"noreferrer noopener\">were charged<\/a> with acting as illegal foreign agents of Saudi Arabia, passing over sensitive user data on critics and dissidents of the royal family in exchange for money, and Zatko said the company\u2019s also dealt with at least one Chinese foreign agent inside the company.<\/p>\n<p>He also said in his time as CISO, he observed at least one instance where a likely foreign agent from India was placed inside the company to gain access to information related to Twitter\u2019s ongoing negotiations with Indian government officials over requests to ban certain accounts and content. He also recalled routinely seeing Twitter account credentials listed for sale on the dark web.<\/p>\n<p>But the status quo at Twitter and preoccupation of leadership with growth and managing other public crises meant the company \u201csimply lacked the fundamental abilities to hunt for foreign intelligence agencies and expel them on their own.\u201d<\/p>\n<p>In the case of the Indian agent, he said he had to task a small internal team to develop the protocols needed to track and monitor just that one individual, a solution that isn\u2019t scalable to Twitter\u2019s larger employee base. The value of such access is so great and easy to gain that he surmised any foreign country not attempting to place agents inside the company wasn\u2019t doing its job.<\/p>\n<p>&#8220;From my understanding from people in the [intelligence] community who focus on foreign intelligence organizations and assets, if you placed somebody in Twitter\u2026it would be very difficult for Twitter to find them, they would probably be able to stay there for a long period of time and gain a significant amount of information to provide back on either targeting people or information as to Twitter&#8217;s decisions and discussions and as to the direction of the company,&#8221; said Zatko.<\/p>\n<p>When asked what data the company tends to collect on the average user, Zatko cited a user&#8217;s phone numbers, their latest IP address, other IP addresses, their current email, prior emails, where they think the user lives, where they are currently connecting from, what language they speak, the type of device are they connected with, their web browser, and possibly their type of computer.<\/p>\n<p>Twitter executives have denied Zatko&#8217;s claims, and after his whistleblower complaint was made public, a company spokesperson said <a href=\"https:\/\/www.scmagazine.com\/analysis\/leadership\/twitter-shakes-up-security-team-with-ouster-of-mudge-zatko-and-rinki-sethi\" target=\"_blank\" rel=\"noreferrer noopener\">he was fired in January<\/a> for &#8220;ineffective leadership and poor performance.&#8221; According to the Wall Street Journal, the company paid Zatko $7 million <a href=\"https:\/\/www.wsj.com\/articles\/twitter-agreed-to-pay-whistleblower-7-million-in-june-settlement-11662661116\" target=\"_blank\" rel=\"noreferrer noopener\">in a settlement <\/a>prior to his submission of the complaint. Questions and a request for comment sent to Twitter&#8217;s press office were not immediately returned.<\/p>\n<p>Committee chair Dick Durbin, D-Ill., made the case that Twitter\u2019s infrastructure is too important to leave user data unsecured, likening it to customers giving their money to a bank who then leaves the vault \u201cwide open.\u201d He referenced a widely reported 2020 incident where two young hackers spear phished Twitter employees over the phone, posing as IT support to gain administrative access that allowed them to take over a number of high-profile accounts, including then-presidential candidate Joe Biden, former President Barack Obama, Elon Musk, Michael Bloomberg and others.<\/p>\n<p>The potential for damage, Durbin argued, could have been far greater.<\/p>\n<p>\u201cWe\u2019ve already seen what can happen when small-time hackers break into Twitter accounts belonging to government officials, but what if next time it isn\u2019t two teenagers trying to pull a crypto scam?\u201d said Durbin. \u201cImagine if it\u2019s a malicious hacker or a hostile foreign government breaking into the President\u2019s twitter account, or sending out false information claiming there as a terrorist attack on one of our cities? We could see widespread panic.\u201d<\/p>\n<p>The failure to safeguard user information was already the subject of a <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2011\/03\/ftc-accepts-final-settlement-twitter-failure-safeguard-personal-information-0\" target=\"_blank\" rel=\"noreferrer noopener\">2011 consent decree<\/a> the company agreed to with the Federal Trade Commission. However, Zatko said that FTC enforcement (usually in the form of one time fines) are viewed as toothless compared to regulation from other countries, like France, and his testimony indicated that the company hasn\u2019t introduced the necessary safeguards to prevent a similar attack from succeeding in the future.<\/p>\n<p>\u201cIt\u2019s not far-fetched to say that an employee at the company could take over the accounts of all of the senators in this room,\u201d he said. \u201cGiven the real harm to users and national security I determined it was necessary to take on the professional and personal risk to myself and my family of becoming a whistleblower.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/33838\/Mudge-Lack-Of-Access-Data-Controls-Invite-Twitter-Exploitation.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":48456,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8682],"class_list":["post-48455","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinegovernmentusatwitter"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mudge: Lack Of Access, Data Controls Invite Twitter Exploitation 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mudge: Lack Of Access, Data Controls Invite Twitter Exploitation 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-14T14:58:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2022\/09\/Peter-Zatko.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Mudge: Lack Of Access, Data Controls Invite Twitter Exploitation\",\"datePublished\":\"2022-09-14T14:58:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/\"},\"wordCount\":1008,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation.jpg\",\"keywords\":[\"headline,government,usa,twitter\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/\",\"name\":\"Mudge: Lack Of Access, Data Controls Invite Twitter Exploitation 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation.jpg\",\"datePublished\":\"2022-09-14T14:58:47+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation.jpg\",\"width\":1024,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,government,usa,twitter\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinegovernmentusatwitter\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mudge: Lack Of Access, Data Controls Invite Twitter Exploitation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mudge: Lack Of Access, Data Controls Invite Twitter Exploitation 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/","og_locale":"en_US","og_type":"article","og_title":"Mudge: Lack Of Access, Data Controls Invite Twitter Exploitation 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-14T14:58:47+00:00","og_image":[{"url":"https:\/\/cdn.scmagazine.com\/wp-content\/uploads\/2022\/09\/Peter-Zatko.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Mudge: Lack Of Access, Data Controls Invite Twitter Exploitation","datePublished":"2022-09-14T14:58:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/"},"wordCount":1008,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/mudge-lack-of-access-data-controls-invite-twitter-exploitation.jpg","keywords":["headline,government,usa,twitter"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/","url":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/","name":"Mudge: Lack Of Access, Data Controls Invite Twitter Exploitation 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/mudge-lack-of-access-data-controls-invite-twitter-exploitation.jpg","datePublished":"2022-09-14T14:58:47+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/mudge-lack-of-access-data-controls-invite-twitter-exploitation.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/09\/mudge-lack-of-access-data-controls-invite-twitter-exploitation.jpg","width":1024,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/mudge-lack-of-access-data-controls-invite-twitter-exploitation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,government,usa,twitter","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinegovernmentusatwitter\/"},{"@type":"ListItem","position":3,"name":"Mudge: Lack Of Access, Data Controls Invite Twitter Exploitation"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48455"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48455\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/48456"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}