How to protect yourself from Twitter’s latest breach

Hackers were able to steal account details from over 200 million Twitter users(new window) and posted the database on a hacking forum in early January 2023. These details include users’ email addresses and Twitter handles, allowing people to potentially identify pseudonymous Twitter accounts. 

Experts believe this list is a refined version of a similar database that was reported on in December 2022 that contained roughly 400 million Twitter handles(new window) and associated emails and phone numbers.

While Twitter denied that these account details were stolen(new window) by “exploiting a vulnerability of [its] systems”, Troy Hunt, the creator of, the website that allows you to see if your data has been exposed in a breach, pointed out that this seems like a carefully worded non-denial: 

Twitter is now facing a class action lawsuit(new window) over its refusal to acknowledge this incident as a breach.

Mr. Hunt has also reported that the email accounts purportedly from the breach seem legitimate.

It seems likely that these account details were obtained by taking advantage of an API flaw that Twitter acknowledged in August 2022(new window). The company was informed in January 2022 that it had introduced a bug in an update in June 2021 that would allow anyone that entered a phone number or email address to see what the corresponding Twitter handle was (if one existed). 

At the time, Twitter claimed the breach exposed roughly 5.4 million Twitter handles(new window) and their corresponding emails and phone numbers. 

How could this breach affect you?

There’s no evidence that hackers accessed users’ passwords or DMs. Still, attackers can now link publicly known email addresses and phone numbers to Twitter accounts, potentially allowing them to identify and doxx Twitter users. It will also allow them to write much more convincing phishing attacks.  

While investigating the breach, Mr. Hunt discovered that 98% of the emails in the Twitter database had previously been exposed(new window) in another data breach. Hackers simply took the exposed email addresses and fed them into Twitter to add another data point to the ever-growing criminal databases. 

How to recover from the Twitter data breach

The first thing you can do is go to window) to see if your email address or phone number was exposed in the breach. If neither appears, you likely have nothing to worry about.

If your email appears, you should remove it from your Twitter account and any other account you use it for. You should also expect an uptick in the volume and quality of phishing emails you receive. 

If your phone number appears, you should unlink it from your Twitter account and any other accounts you use it for. You could also receive malicious phone calls and text messages (smishing) trying to fool you into exposing sensitive information. 

Even if your phone number doesn’t show up in the Have I Been Pwned database, if you’re using your phone number for a two-factor authentication (2FA), you should stop. Two-factor authentication via SMS is insecure and you should switch to something safer, like a time-based one-time password app or a hardware security key.  

How to protect yourself from future breaches

While you cannot prevent data breaches yourself, you can reduce your vulnerability to data breaches in general. The following steps will prevent hackers from getting their hands on truly sensitive information or being able to use the data they’ve stolen to get into your other accounts:

  1. Turn two-factor authentication on for every account possible. This prevents hackers from being able to access your account even if they have your password and email. It can be a crucial last line of defense.
  2. Use strong, unique passwords for each account. If you use a different password for each account, a breach can never affect more than that account, limiting the potential damage and recovery time. You should also use a secure, open-source password manager to keep track of all your passwords. 
  3. Use a unique email alias for each account. Using the same logic as unique passwords, hackers can’t identify your accounts or track you across platforms if you create a unique email alias for each account. SimpleLogin by Proton Mail(new window) makes creating and managing dozens of email aliases simple. If you used SimpleLogin to create an alias for your Twitter account, you would not be at risk of being identified and could easily turn off that alias to avoid phishing attacks. 
  4. Don’t share sensitive information (when you can avoid it). It’s time to be real and admit that there’s a decent chance that anything you share with an online company could end up being exposed at some point. But a company can’t expose something in a breach that you never gave it in the first place. When possible, avoid sharing anything more than a pseudonym and an email alias when you create an account. 

These steps will help reduce your exposure to potential breaches. Unfortunately, there’s very little you can do to protect information that organizations already have, which is why we recommend you only use organizations with good security track records. This one gets harder every year as more and more companies suffer breaches and hacks. However, you should look for organizations that use open-source code and have an active security contributor community. It shows these companies prioritize data security and are willing to face scrutiny from experts to keep your information safe.

You can also push governments to enforce data privacy laws and punish data breaches. Twitter is still under a consent decree(new window) over data breaches from 2011. It should have detected that user accounts were being scraped and fixed the problem faster. Unfortunately, data breaches will continue to happen until they’re made too costly to ignore.

Protect your privacy with Proton
Create a free account

Related articles

Identity theft is a major sector of criminal activity. About 24 million people fell victim in the United States alone in 2021, costing them over $16 billion. Credit card fraud is the most common type, but criminals target all kinds of personal data.
Google is one of the biggest obstacles to privacy. The Big Tech giant may offer quick access to information online, but it also controls vast amounts of your personal or business data. Recently, more people are becoming aware of the actual price you
What to do if someone steals your Social Security number
If you’re a United States citizen or permanent resident, you have a Social Security number (SSN). This number is the linchpin of much of your existence, linked to everything from your tax records to your credit cards. Theft is a massive problem, whic
compromised passwords
Compromised passwords are a common issue and probably one of the biggest cybersecurity threats for regular people. How do passwords get compromised, and is there anything you can do to prevent it? * What does compromised password mean? * How do pa
Is WeTransfer safe?
  • Privacy basics
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi