Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into SDK

By | 4:13 AM Leave a Comment

Twilio has confirmed that, for 8 or so hours on July 19, a malicious version of their TaskRouter JS SDK was being served from their one of their AWS S3 buckets. “Due to a misconfiguration in the S3 bucket that was hosting the library, a bad actor was able to inject code that made the user’s browser load an extraneous URL that has been associated with the Magecart group of attacks,” the company shared. Who’s … More

The post Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into SDK appeared first on Help Net Security.


from Help Net Security https://ift.tt/3eXlZ58

0 comments:

Post a Comment