twitter-whistleblower-complaint:-the-tl;dr-version

Share news article

Share on facebook
Share on twitter
Share on linkedin
Share on email

Twitter Whistleblower Complaint: The TL;DR Version

Twitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s actions amount to a national security risk.

A recently surfaced 84-page whistleblower report filed with the US government by Twitter’s former head of security Peiter “Mudge” Zatko last month blasts his former employer for its alleged shoddy security practices and being out of compliance with an FTC order to protect user data.

Twitter has responded alleging that Zatko is a “disgruntled employee” who was fired for poor performance and leadership. In a letter to employees Twitter’s CEO Parag Agrawal asserts that Zatko’s claims are a “false narrative that is riddled with inconsistencies and inaccuracies, and presented without important context.”

Here is an abbreviated overview of the allegations and Twitter’s reaction.

Allegations

Zatko, a respected white-hat hacker who served as Twitter’s head of security for roughly 15 months between 2020 and 2022, accused Twitter of a litany of poor security and privacy practices that together constituted a national security risk.

Top accusations include:

  • Twitter is a mismanaged company and gives too many of its staff access to sensitive security and privacy controls without adequate oversight.
  • One or more Twitter employees may be working for undisclosed foreign intelligence services. This, according to Zatko, elevates his concerns to a matter of national security.
  • Nearly half of Twitter’s servers lack basic security features, such as data encryption, because software running on them is either outdated or unpatched.
  • Twitter executives have prioritized growth over security as they have personally pursued massive bonuses, as high as $10 million, as incentives for the company’s rapid expansion.
  • The company is out of compliance with a 2010 FTC order to protect users’ personal information. Additionally, the company has lied to independent auditors of an FTC mandated “comprehensive information security program” tied to the 2010 order.
  • Twitter does not honor user requests to delete their personal data, because of technical limitations.
  • When Zatko attempted to bring these and many other security and privacy issues to Twitter’s board, company management misrepresented his finding and/or tried to hide the report.
  • Twitter allowed some foreign governments “… to infiltrate, control, exploit, surveil and/or censor the ‘company’s platform, staff, and operations,” according to the redacted whistleblower report submitted to congress.
  • Twitter does not have the resources or capacity to accurately determine the true number of fake (or bot) accounts on its platform. This question is central to a Elon Musk’s attempt to back out of buying the company for $44 billion.

Twitter’s Muted Response 

The thrust of Twitter’s response to Zatko is that he is a disgruntled employee, bad at his job and scapegoating Twitter for his failures. It points out that it has addressed and continues to aggressively address many of the IT security issues pointed out by Zatko.

An alleged response by Twitter’s CEO Parag Agrawal sent internally to Twitter employees was posted online.

NEW: First time Twitter CEO @paraga weighs in on whistleblower story.

Sending this message to staff this morning. pic.twitter.com/WY4TCqbA5q

— Donie O’Sullivan (@donie) August 23, 2022

Meanwhile top Democrats and Republicans in Congress have reacted by promising to investigate the claims. Sen. Richard Durbin (D-IL), chair of the Senate Judiciary Committee, confirmed he was investigating the whistleblower disclosure.

The whistleblower’s allegations of widespread security failures at Twitter, willful misrepresentations by top executives to government agencies, and penetration of the company by foreign intelligence raise serious concerns. https://t.co/9QQtlDSogr

— Senator Dick Durbin (@SenatorDurbin) August 23, 2022

Related News

Vulnerability Summary for the Week of November 21, 2022

airbnb — optica A remote code execution (RCE) vulnerability in Optica allows unauthenticated attackers to execute arbitrary code via specially…
TikTok Invisible Body Challenge Trend Abused to Drop Malware

TikTok Invisible Body Challenge Trend Abused to Drop Malware

The newest trend on TikTok, the Invisible Body Challenge, is being abused by cybercriminals to spread WASP info-stealing malware. This…
Acer Laptop Vulnerability Allows Malware Infection During Secure Boot

Acer Laptop Vulnerability Allows Malware Infection During Secure Boot

Cybersecurity firm ESET’s researchers have identified a vulnerability affecting Acer laptops. The bug isn’t new, as ESET already discovered it…