recommended reading


4.6 million Snapchat accounts exposed

Data dump; Software vulnerability

The release of personal information stored by the text messaging service followed repeated warnings by researchers about vulnerabilities in its database.

On Jan. 2, two days after the hack, officials at Snapchat, a provider of self-destructing communications meant to protect privacy, acknowledged in a blog post that “an attacker released a database of partially redacted phone numbers and usernames.”

Officials claimed that, “no other information, including Snaps, was leaked or accessed in these attacks.”

The hacker dumped the credentials on a site called In a statement to TechCrunch, the site’s operators said they extracted and posted the credentials to promote cybersecurity.

“Our motivation behind the release was to raise the public awareness around the issue, and also put public pressure on Snapchat to get this exploit fixed. It is understandable that tech startups have limited resources but security and privacy should not be a secondary goal. Security matters as much as user experience does,” they stated.

ZDNet first reported last month that Gibson Security researchers published Snapchat code allowing mass matching of phone numbers with names, after Gibson disclosed the flaw to the company in August and did not see adequate fixes.

“Even long after that disclosure, Snapchat was reluctant to taking the necessary steps to secure user data,” told TechCrunch after the New Year’s hack. “Once we started scraping on a large scale, they decided to implement very minor obstacles, which were still far from enough.”

The hackers said they performed the release in a way that should minimize spam and abuse. They censored the last two digits of the phone numbers but said they might still release the unfiltered data.

Now, Snapchat officials say they will attempt to ensure researchers can reach the company, in the event this happens again.

“We want to make sure that security experts can get ahold of us when they discover new ways to abuse our service so that we can respond quickly to address those concerns. The best way to let us know about security vulnerabilities is by emailing us:,” their blog post states. 

ThreatWatch is a regularly updated catalog of data breaches successfully striking every sector of the globe, as reported by journalists, researchers and the victims themselves.


Social Media


January 1, 2014

reported by


number affected

4.6 million user accounts

location of breach




location of perpetrators


date breach occurred


date breach detected

December 31, 2013

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.