Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
927Twilio.com 09/2024
STAFF TEAM
#1
Twilio.com 09/2024

In September 2024, an American call interpreter suffered a data breach that exposed 11802 Twilio's call records.
Breached by @grep

format: sql

Contents:
    INSERT INTO `call_call` (`id`, `start_time`, `end_time`, `called_from`, `called_to`, `status`, `duration`, `notes`, `agent_id`, `interpretation_session_id`, `call_sid`, `direction`, `call_type`, `interpreter_id`) VALUES 
    
    INSERT INTO `call_interpretationsession` (`id`, `start_time`, `end_time`, `called_from`, `called_to`, `status`, `incoming_call_sid`, `duration`, `language`, `rate`, `notes`, `fields`, `agent_id`, `customer_id`, `interpreter_id`, `conference_name`, `sms_callback`, `interpretation_start_time`, `recording_url`, `agent_answered_time`, `payout`, `total_cost`, `incoming_call_status`, `access_code`, `autoconnect`, `client_hold_time`, `department_code`, `billing_type`, `interpreter_rate`, `interpreter_rate_type`, `backup_dial_time`, `extensions_dialed`, `queued_count`, `is_video`, `room_name`, `interpreter_dialed`, `disposition_response`, `remarks`, `agent_dialled_interpreters`, `disposition_field_agent`, `disposition_response_agent`, `remarks_agent`, `call_holded`) VALUES


sample:
https://files.offshore.cat/ZvAnya87.txt

Hidden Content
You must register or login to view this content.
[-] The following 1 user Likes wht's post:
  • crik123
STAFF TEAM
#2
KKOKOOKKKOOK
Reply
STAFF TEAM
#3
a great and big one
Reply
STAFF TEAM
#4
Superba
Reply
STAFF TEAM
#5
tks bro
Reply

Reply to this thread