• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Twitter Hackers Accessed Direct Messages For 36 Accounts

Twitter hackers accessed direct messages for 36 accounts

You are here: Home / General Cyber Security News / Twitter hackers accessed direct messages for 36 accounts
July 23, 2020

The hackers who ran a cryptocurrency fraud making use of significant-profile, confirmed Twitter accounts, together with those belonging to Joe Biden, Apple, Monthly bill Gates, Uber and Barack Obama, accessed the direct messages (DMs) of 36 accounts and downloaded account knowledge from 8 accounts through “Your Twitter Info.”

There is no indicator that the DMs of any former or recent elected official, other than one particular Dutch politician, was accessed and Twitter does not imagine that the attackers saw any personal information and facts “for the huge majority of people” whose accounts had been qualified, the business mentioned in an update.

Twitter acknowledged that previous week’s attack was the consequence of a “coordinated social engineering campaign” involving multiple staff members.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The attackers, who could see email addresses and phone figures, couldn’t see past account passwords, which are not saved in basic textual content. Nor are they out there through the equipment the hackers used in the attack, the organization reported, noting that an ongoing investigation is making an attempt to establish if the perpetrators experienced been ready to perspective further details linked with the impacted accounts.

In spite of a swirl of speculation above the nature of the assault and the actors powering it  – ranging from a coordinated nation-condition attack to politically enthusiastic hijinks to a smokescreen or apply operate for a more profound assault – Allison Nixon, main study officer at Unit 221B, understood who Twitter was likely dealing with.

“The moment I discovered they went just after one particular-letter accounts [those affiliated with elite users], I understood it was the OGuers [original gangsters],” Nixon advised SC Media of the fraud community she’s tracked for years.

“Few on the internet make investments in that,” she mentioned, noting that in phrases of system and focusing on, the Twitter hack boasted the hallmarks of the fraudsters. 

Right after minimal-key beginnings “taking above great names from avid gamers,” the community moved on in 2016 to crypto wallets, then on to having more than celebrity Twitter accounts, one thing they’ve been carrying out for “a pretty long time,” Nixon mentioned. “The sample of actions matches with OGusers’ totally strange sample of habits.”

In addition to running phishing campaigns, OGers are regarded for their insider recruitment strategies — which incorporate contacting workers to solicit data, spamming purchaser assistance reps with delivers to make huge cash and even socializing with them at events to entice them into for-earnings strategies.

Nixon’s first instinct about the Twitter assault proved exact – quickly after the attack, warnings commenced heading up in the OGuser community not to sell just one-letter accounts. Soon afterward, members of the team commenced spilling details to journalists. Nixon would alternatively associates of the group report what they know to the FBI and create regardless of what proof they have as an alternative of just dishing to the press. “The initial individual who snitches gets the best plea offer,” she pointed out.

Ilia Kolochenko, founder and CEO of ImmuniWeb, said that crediting the full accomplishment of the assault — which he called “unprecedentedly disrupting” — to “comparatively banal social engineering” is questionable. “Hijacking 1 or two accounts by tricking Twitter tech help would seem reasonably plausible, but the extensive-lasting takeover of dozens of top rated accounts necessitates a significantly extra complex and multidimensional planning of attack,” he mentioned.

The documented social engineering assault vector likely “was enhanced by exploitation of other weaknesses in Twitter’s interior security. It is not excluded that the attackers have been assisted by an insider or had been exploiting a substantial-chance vulnerability detected in just one of the Twitter’s web methods,” Kolochenko continued. “Otherwise, we may possibly reasonably infer that Twitter has pretty much no interior security controls and best practices that we ought to normally expect from a tech company of its dimension.”

Previous Post: «Cyber Security News US Banks Can Now Provide Crypto Custody Companies
Next Post: Florida Tax Office Blames Data Breach on Virus Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.