Threat Actor: @grep | @grep
Victim: Twilio | Twilio
Price: Not disclosed
Exfiltrated Data Type: Call records
Key Points :
- The breach affects an American call interpretation service, exposing 11,802 individual call records.
- Data includes call identifiers, timestamps, caller and receiver numbers, call status, and duration.
- Additional details include the interpreter involved, language used, and associated costs for each call.
- The breach occurred in September 2024, raising significant data security concerns.
- The threat actor provided a download link for the data and included samples from the leak.
In a recent revelation that raises concerns over data security, a threat actor known as @grep has announced the compromise of Twilio’s call records. The breach, disclosed in a post on the dark web forum, affects an American call interpretation service, resulting in the exposure of 11,802 individual call records.
The alleged data breach, which occurred in September 2024, provides a detailed look at the sensitive information handled by Twilio. The leaked database includes various fields such as call identifiers, timestamps, caller and receiver numbers, call status, and duration. Additionally, records reveal intricate details about each call, including the interpreter involved, language used, and associated costs.
The threat actor shared a download link for the data and included samples from the alleged leak.
The post Twilio Call Records Allegedly Exposed on Dark Web appeared first on Daily Dark Web.