Popular service Timehop, created in 2011, is a kind of "time machine" for users of social networks. It allows to find out what the user or his friends published a few years ago, collecting information from Facebook, Instagram, Twitter and even photos in Dropbox.
Last Sunday, the company reported that on July 4, 2018, Timehop was attacked by unknown intruders, and as a result, data of 21 million people 'leaked'.
Representatives of the company report that they discovered a breach when the hackers were still active and managed to stop the leakage of information, but for many users it was too late. The unknown managed to steal email addresses, names and phone numbers of 21 million users.
In addition, there were compromised "keys that let Timehop read and show you your social media posts (but not private messages)." Developers assure that all keys are already deactivated and no longer work, and users need to re-authenticate in the application.
The official message emphasizes that these tokens do not allow anyone (including Timehop itself) to access Facebook Messenger or personal messages on Twitter or Instagram. Access is granted only to ordinary records. Theoretically, during the incident there was a short period of time during which unauthorized users could access such records of the victims. However, there is no proof that this really happened yet.
Almost no technical details about the incident have yet been reported, as the company continues its internal audit and investigation, involving local and federal law enforcement agencies, as well as third-party cybercriminals.
Representatives of Timehop recognize that the attackers managed to get into the system because of compromising credentials for one of the "cloud" accounts. The fact is that the account was not protected by multifactor authentication, and only now the company decided to attend to additional protection of authorization and access control.