• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
security experts 'concerned' over compromise of british army's social media

Security experts ‘concerned’ over compromise of British Army’s social media accounts

You are here: Home / General Cyber Security News / Security experts ‘concerned’ over compromise of British Army’s social media accounts
July 4, 2022

Shutterstock

The operational security (opsec) of the British Military has been questioned by security authorities soon after its social media accounts were compromised on Sunday.

Each the British Army’s Twitter and YouTube accounts were taken over by a at the moment mysterious party this weekend, ensuing in the feeds currently being adjusted to encourage non-fungible tokens (NFTs) ahead of currently being reverted again to regular.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Though less than control of the compromisers, NFT-linked tweets have been posted and retweeted, the account’s visuals have been improved, and the display names have been also altered. The Twitter account deal with was hardly ever tampered with during the incident.

British Army Twitter account shown to be compromised with altered images and display name

Wayback Device

The videos on the military’s YouTube channel have been deleted and changed with Elon Musk-themed pro-cryptocurrency films which amassed countless numbers of viewers.

Issues have been raised above the opsec of the British Army’s social media crew and how these types of a compromise was at any time capable to get put. 

Senior researcher at Toronto-based Citizen Lab John Scott-Railton claimed cons focusing on confirmed accounts, attempting to choose about their accounts, are typical but lifted the query of how effortless it would be for a hostile country-state to see results with a identical campaign.  It “should difficulty our rest,” he stated in a tweet.

Some are parsing this as “is a international gov fake flagging as NFT bros?”Doubtful. These are constant ripoffs targeting verified accounts.The issue is that scammers efficiently bagged a verified mouthpiece for a significant navy. And if they could do it…

— John Scott-Railton (@jsrailton) July 3, 2022

Fielding inquiries on how powerful the communications from a hijacked account could be, Scott-Railton pointed to Citizen Labs’ prior perform on risk products for this condition. 

One particular case in point he employed to show the result was the scenario of the Syrian Electronic Military hacking the Affiliated Press’ Twitter account, putting up tweets saying two explosions experienced strike the White House leaving then-President Barack Obama wounded. 

The incident went on to provide the Dow Jones Index down by 1% briefly, he claimed.

Responding to the compromise of the British Army’s feeds, the Ministry of Defence (MoD) mentioned that “an investigation is underway” and that it would not comment any more till that investigation has arrived at its conclusion. 

The breach of the Army’s Twitter and YouTube accounts that transpired before today has been solved and an investigation is underway. The Military usually takes information security very seriously and until eventually their investigation is total it would be inappropriate to comment more.

— Ministry of Defence Push Workplace (@DefenceHQPress) July 3, 2022

Despite the fact that it’s presently unclear how the compromisers took manage of the social media accounts, one former MoD and GCHQ cyber security professional has said that one particular probability could be that a third party in the British Army’s offer chain could have acquired access through a plug-in or social media administration device. 

“If this plugin or resource was not secured then it could have given the cyber attacker the means to specifically submit onto the social media accounts with no possessing to log in to both of those Twitter or YouTube,” mentioned James Griffiths, co-founder and technical director at Cyber Security Associates.

“The British Military social media management staff might have been a goal, on the other hand, it’s likely that they would have had multi-factor authentication (MFA) in area to avert an attack like this from occurring,” he included. 

“Clearly both equally Twitter and YouTube have MFA ability to defend accounts so it will be fascinating to know for guaranteed how the attackers managed to compromise these high-profile accounts.”


Some sections of this article are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News HackerOne Insider Defrauded Customers
Next Post: Hackers claim to steal personal data of over a billion people in China hackers claim to steal personal data of over a billion»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.