SWAPD is a trusted middleman service dedicated to offering our users the safest way to buy, sell, or trade items and services of virtual nature. SWAPD opens doors for you to earn and rise to fame in the digital universe by connecting you with vast network of buyers, sellers, and opportunities.
We’re sad to announce that we had our first somewhat of a security breach. I say somewhat because everything is safe and sound, but someone got a hold of our API keys used for our Twilio.com phone verification system. Don’t panic, this doesn’t compromise your account security in any way. Our phone verification plugin is a one-time messaging feature used to confirm new member phones. We do not know how this happened, we’re investigating. However, the phone number tied to the API key was used in very malicious ways, mainly to trick people out of their CoinBase login credentials. We don’t have all the data yet, and we do not know whether any SWAPD members were targeted. So far, it seems that whoever breached us, used our system to make calls out to random people. We have a snippet of the transcript from the calls made from our phone number:
“we are calling from Coinbase fraud prevention line. we have received a request to change ur phone number from a united kingdom IP address. If this was not you, please press 1 to secure your account”
This was an automated recording talking, and around 500 of these calls were made since last night. If you received such a call, please ignore it and report it in this topic.
We will do our best to fix this up ASAP. Thank you for reading.
It’s got nothing to do with that, Twilio is strictly a phone service, nothing else was affected. Looking at the website it’s got garbage security and @SWAPD ’s account was hacked as most likely his email:password was in another companies database breach.
seriously doubt he’d use the same password in multiple places and if it got leaked in one breach, the only account that ended up getting breached was his Twilio.
I am not a coder, but perhaps a bug/fault in our verification plugin? We’re investigating that possibility, also. Twilio contacted us two months ago about our account breach, but there were no signs of any breach or malicious activity. Fast forward to yesterday, according to Twilio we were breached again, this time with damage. Regardless, they forced us to implement a crazy long password and 2FA last time it happened. I don’t see how anyone could log in to our account from our end.
Can confirm. However, you should ALWAYS ALWAYS ALWAYS edit and delete sensitive images once they’re not needed, they will be removed from the server after 48 hours of editing.
Terrible bro hope it resolves soon.
My story was worse, someone injected paypal phishers all over my server thanks to a fucking faulty plugin…
1000+ victims but host saved my ass from going to jail
We have all the list of IPs that used our system to send out fraudulent messages.
206.189.176.252 United States
164.90.133.118 United States
95.111.240.94 Germany
51.89.242.39 United Kingdom
116.202.102.160 Germany
35.171.84.184 United States
3.87.52.3 United States
34.227.67.251 United States
43.248.153.39 India
54.147.150.200 United States
124.158.184.198 Indonesia
124.158.184.197 Indonesia
124.158.189.31 Indonesia
124.158.189.52 Indonesia
3.90.183.160 United States
124.158.189.62 Indonesia
54.174.254.161 United States
124.158.189.44 Indonesia
54.84.83.126 United States
103.100.4.117 India
124.158.189.57 Indonesia
52.87.199.240 United States
124.158.184.192 Indonesia
54.144.220.177 United States
124.158.189.48 Indonesia
79.106.228.213 Albania
52.201.250.224 United States
52.207.160.202 United States