TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Finding vulnerable Twitter accounts with expired domains

196 pointsby zainamroalmost 5 years ago

22 comments

Taekalmost 5 years ago
At some point in time we decided that email addresses control the keys to the kingdom. If you lose access to your email, there goes your social media accounts, your bank accounts, your gaming accounts, and potentially many of your commercial accounts as well.<p>And then we decided that custom domains are the most professional. Which does make sense, there can only be one &#x27;robert@gmail.com&#x27;. But, this is coupled with the idea that domains can expire, and that expiry does not appear to kill the identity that&#x27;s potentially associated with the domain.<p>We should not be using email addresses as our primary source of identity verification in the first place. And we definitely _should_ have some way to globally declare that an identity has been compromised. Especially given our society&#x27;s track record of keeping database safe from breach.<p>I more or less assume it is inevitable that one of my major accounts will be compromised, and that this will be able to cascade into most of my major accounts being compromised. I do what I can to protect myself, but gmail as a single source of failure makes me nervous. Using any email provider besides gmail makes me even more nervous, because they don&#x27;t have the full power and knowledge of Google protecting their databases.
评论 #24255376 未加载
评论 #24254233 未加载
评论 #24257688 未加载
评论 #24254334 未加载
评论 #24255728 未加载
评论 #24257886 未加载
评论 #24255145 未加载
评论 #24254850 未加载
评论 #24255358 未加载
评论 #24255673 未加载
评论 #24257735 未加载
jimmiesalmost 5 years ago
This domain hijacking idea reminds me of an incident with Google I discovered a couple of years ago that landed me a bug bounty with them. I found out they created email logins with a not-registered domain for their candidacy account. I ended up registering that domain and &quot;sold&quot; it back to them in good faith. At least I can die with a smile on my face -- I once sold Google a domain.<p>details: <a href="http:&#x2F;&#x2F;www.tnhh.net&#x2F;posts&#x2F;gcandidate-who-is-interviewing-with-google.html" rel="nofollow">http:&#x2F;&#x2F;www.tnhh.net&#x2F;posts&#x2F;gcandidate-who-is-interviewing-wit...</a>
评论 #24257241 未加载
superasnalmost 5 years ago
Even though they show the starred email address and one of the suggestions is not to show the email, I really hope people don&#x27;t do that.<p>There is nothing more frustrating when you&#x27;re recovering your password and the site says we have sent you an email with no hint where and even worse sometimes they say &quot;if that email was in our records then you should get the link&quot; and you&#x27;re wondering did that work and #1 worst is after making me solve 10 traffic lights and zebra crossings.<p>Because at that moment I feel it&#x27;s just easier to start over and create a new account.
评论 #24254230 未加载
评论 #24256425 未加载
评论 #24256167 未加载
WAalmost 5 years ago
This was a common way to harvest 6-digit ICQ numbers back in the day. Hotmail, MSN etc. had expiring email addresses as well that you could register to reset the password to the ICQ number.
评论 #24255980 未加载
评论 #24254302 未加载
Thorrezalmost 5 years ago
&gt; I believe it accounts for a large portion of stolen accounts&#x2F;handles on the platform.<p>I doubt it&#x27;s a large portion. It costs money for each hijacked account, and custom domains I would assume are only used on a tiny fraction of accounts. The vast majority of stolen accounts I would attribute to credential stuffing.
rickdeveloperalmost 5 years ago
What would be a universal solution to this problem? The only thing I can really think of is platforms not allowing custom domains for connected email accounts, but that seems sub-optimal.
评论 #24253648 未加载
评论 #24253650 未加载
评论 #24254490 未加载
评论 #24253657 未加载
评论 #24253709 未加载
评论 #24255898 未加载
jl6almost 5 years ago
This isn’t the workflow I see when trying the password reset process on an old account that I’ve recently tried to recover. I’ve forgotten both the password and the email address associated with the account, but I know the domain I would have used, and I own it so I could easily prove ownership of the email address if I knew what it was.<p>But when I click Forgot Password, it asks me for my username and also the email address before I can continue.<p>How do you get the email address hint like the article shows?
评论 #24255711 未加载
blindmalmost 5 years ago
One has to wonder about sustaining access to a compromised account. Twitter in my experience has been very aggressive in asking to verify my account with a phone number when logging in from shady locations &#x2F; with a VPN. What if you get access to an account using the method described in the article, but then days later get locked out due to suspicious-looking behavior &#x2F; you don&#x27;t have access to the phone number used to register the account?
评论 #24254806 未加载
ErikAugustalmost 5 years ago
Anyone else have people sign up for accounts with your email address? I had one recently where I could access a working GrubHub account for a while. And in the spirit of lame on-boarding optimization and “churn” prevention, while I could have used it - I couldn’t cancel the account. That required the phone number associated.
评论 #24254549 未加载
评论 #24254679 未加载
Fnoordover 4 years ago
This is how I used to get all kind of old ICQ numbers back in the 90s. Hotmail addresses, back then, used to expire.<p>Ironically enough, I&#x27;ve been vulnerable to the described attack afterwards as I had my own domain, didn&#x27;t use it much anymore, and gave it away (to a band with the same nickname). Back then, a domain was pricey, and I was poor, so...
paulpauperalmost 5 years ago
i dunno how this got to the front page. this is an extremely old vector and not even that effective given the tiny, tiny likelihood of finding a domain or account that works., It would actually be cheaper to buy an old twitter account from someone who does not his account anymore legit, than try to go through millions of accounts, which requires tons of proxies and other evasion methods. Twitter is not easily searchable and neither is google. Twitter has extreme rate-limiting measures, so you need a lot of proxies for this to work and those cost money.
vmceptionalmost 5 years ago
&gt; This attack can potentially be executed on other platforms besides Twitter, assuming one can find a similar discovery method<p>You don’t need another discovery method after you take their Twitter account and email :)<p>Only for targets not on twitter.<p>My point is that Twitter is probably enough.<p>But if you really just want to compare domain names that are expiring to email addresses, you can just use one of those business bots that spammers, recruiters and sales people use, and just check emails in their database to domains expiring.
bdcravensalmost 5 years ago
My wife and I started up a small reselling business, based on our name. The dotcom for it was previously owned, but they let the domain lapse, but they still have the Twitter account (that has the web address we now own in their profile; they haven&#x27;t posted since 2016). I tried an approach similar to the article, but they apparently used Gmail to set it up. (I reached out to them to buy it to no response; I assume that Twitter account has been orphaned)
评论 #24255088 未加载
thdcalmost 5 years ago
What if we could have services encrypt their emails sent to us via pgp? eg Twitter (or anything else) asks for your public key and then sends all future emails using it.
评论 #24254972 未加载
评论 #24255765 未加载
tucifalmost 5 years ago
I&#x27;ve thought about this in terms of people passing away and the domain no longer being renewed afterwards.<p>10 years limit on domain registrations seems ridiculous, we need lifetime-span registration capabilities, at least.
rootsudoalmost 5 years ago
This has been standing practice for a while and is not connected to just Twitter. Sometimes you can find public NDR&#x27;s online via bug reports and such and easily grab a service account.
palad1nalmost 5 years ago
Heh. I did something like that: <a href="https:&#x2F;&#x2F;xach.livejournal.com&#x2F;227751.html" rel="nofollow">https:&#x2F;&#x2F;xach.livejournal.com&#x2F;227751.html</a>
Lammyalmost 5 years ago
On the plus side, it&#x27;s heartening to learn enough people use non-GMail&#x2F;Outlook&#x2F;Yahoo&#x2F;WhateverSilo email addresses to make such an attack viable :)
homeroalmost 5 years ago
Didn&#x27;t Yahoo close unused accounts at some point opening the doors to all kinds of takeovers?
jcimsalmost 5 years ago
Curious what Twitter would do if this was contested later.
mobilioalmost 5 years ago
If you get domain you can watch for mails from LinkedIn, Pinterest, Facebook, Instagram and many more!
SR-71_Blackbirdalmost 5 years ago
Old news, this has been known for years.