• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Twitter Confirms Spear-Phishing Attack Brought about Account Takeover

You are here: Home / General Cyber Security News / Twitter Confirms Spear-Phishing Attack Brought about Account Takeover
July 31, 2020

Twitter has verified that the social engineering assault which enabled the takeover of major accounts was obtained by a spear-phishing assault.

In an update to its prior assertion, Twitter stated the assault happened on July 15 and “targeted a little amount of staff by way of a phone spear-phishing assault.” This attack enabled the attackers to receive obtain to each the internal network and particular personnel qualifications that granted them obtain to interior aid instruments.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Not all of the workforce that ended up at first qualified experienced permissions to use account administration tools, but the attackers utilised their credentials to access our inner programs and acquire information and facts about our processes,” it reported. This then enabled them to target extra employees who experienced access to account guidance applications.

Using the qualifications of the workforce with access to these equipment, the attackers specific 130 Twitter accounts, in the long run Tweeting from 45, accessing the DM inbox of 36 and downloading the Twitter data of 7. 

In the preliminary assault, Twitter claimed on 16 July that the coordinated account hijacking campaign wad carried out by a “coordinated social engineering assault by persons who successfully qualified some of our workers with entry to inner devices and equipment.” For a period of time of time, accounts with tens of millions of followers belonging to Jeff Bezos, Bill Gates, Barack Obama, Joe Biden, Elon Musk, Kanye West and other individuals were briefly hijacked and employed to advertise a cryptocurrency fraud. The company accounts of Apple, Bitcoin, Coinbase and other individuals were being also taken more than.

A working day later on, Twitter disclosed that 130 accounts had been focused, and the properly compromised accounts represented a  “small subset” of the complete selection of accounts the attackers had in their crosshairs.

Answering queries about access to user accounts, Twitter reported it has groups around the earth that aid with account assistance that use proprietary instruments to help with a wide variety of support issues. “Access to these applications is strictly minimal and is only granted for legitimate small business reasons,” it described. “We have zero tolerance for misuse of qualifications or equipment, actively keep an eye on for misuse, frequently audit permissions and acquire speedy motion if everyone accesses account info without a legitimate enterprise explanation.”

On the other hand, Twitter reported it is now “taking a really hard glimpse at how we can make [the access tools] even much more refined.”

Looking forward, it reported since the assault it has “significantly limited access to our internal equipment and methods to make sure ongoing account security even though we complete our investigation” and it is continuing to commit in improved security protocols, tactics and mechanisms.

“Going forward, we’re accelerating various of our pre-present security workstreams and improvements to our equipment. We are also strengthening our techniques for detecting and blocking inappropriate obtain to our inner techniques and prioritizing security perform across quite a few of our groups. We will keep on to manage ongoing business-huge phishing workout routines all over the calendar year.”

Stuart Reed, Uk director at Orange Cyberdefense, reported: “As suspected, this breach resulted from social engineering – hackers preying on human vulnerabilities. Complex countermeasures towards phishing tries and detecting malicious routines these days are substantially more strong than they have been in the previous. The human, on the other hand, is additional elaborate and tough to forecast in sure situations while effortless to manipulate in other individuals.

“It is critical businesses hire a layered method of people, system and technology for ideal cybersecurity. This incident underlines the critical value of recognition and education amid personnel and the position they participate in in excellent data hygiene – cybersecurity is not the sole issue of an specific or a perform, it is a shared duty of all.”

Previous Post: «Cyber Security News EU Applies Initially At any time Sanctions in Reaction to Cyber-Assaults
Next Post: New Attack Leverages HTTP/2 for Productive Remote Timing Facet-Channel Leaks New Attack Leverages Http/2 For Productive Remote Timing Facet Channel Leaks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Copyright © TheCyberSecurity.News, All Rights Reserved.