Buffer founder and CEO Joel Gascoigne has not, at this time, shared details about how the breach happened, but has confirmed that spam has been sent out from some 30,000 Facebook accounts that users have connected to their Buffer accounts.
The company has disabled all postings to prevent more spam from going out as soon as they discovered the problem, and according to Gascoigne, they have "greatly increased security" of how they are posting to the two social networks.
They have also added encryption of OAuth access tokens and have changed all API calls to use an added security parameter.
Unfortunately, the posted spam messages cannot be deleted by Buffer, so Gascoigne invited users to check their Facebook and Twitter accounts and to delete them manually if they have been affected. Twitter users will also have to reconnect all their Twitter accounts so that they can continue with their posting.
The good news is that appears that no Buffer password were affected, and no billing or payment information was compromised, and the company is working with experts to find our just how the spammers managed to get into their systems.
The company is definitely to be complimented on their quick response and on how they are handling this incident and keeping users in the loop.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.