• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Twitter Hackers Accessed Direct Messages For 36 Accounts

Twitter hackers accessed direct messages for 36 accounts

You are here: Home / General Cyber Security News / Twitter hackers accessed direct messages for 36 accounts
July 23, 2020

The hackers who ran a cryptocurrency fraud making use of significant-profile, confirmed Twitter accounts, together with those belonging to Joe Biden, Apple, Monthly bill Gates, Uber and Barack Obama, accessed the direct messages (DMs) of 36 accounts and downloaded account knowledge from 8 accounts through “Your Twitter Info.”

There is no indicator that the DMs of any former or recent elected official, other than one particular Dutch politician, was accessed and Twitter does not imagine that the attackers saw any personal information and facts “for the huge majority of people” whose accounts had been qualified, the business mentioned in an update.

Twitter acknowledged that previous week’s attack was the consequence of a “coordinated social engineering campaign” involving multiple staff members.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The attackers, who could see email addresses and phone figures, couldn’t see past account passwords, which are not saved in basic textual content. Nor are they out there through the equipment the hackers used in the attack, the organization reported, noting that an ongoing investigation is making an attempt to establish if the perpetrators experienced been ready to perspective further details linked with the impacted accounts.

In spite of a swirl of speculation above the nature of the assault and the actors powering it  – ranging from a coordinated nation-condition attack to politically enthusiastic hijinks to a smokescreen or apply operate for a more profound assault – Allison Nixon, main study officer at Unit 221B, understood who Twitter was likely dealing with.

“The moment I discovered they went just after one particular-letter accounts [those affiliated with elite users], I understood it was the OGuers [original gangsters],” Nixon advised SC Media of the fraud community she’s tracked for years.

“Few on the internet make investments in that,” she mentioned, noting that in phrases of system and focusing on, the Twitter hack boasted the hallmarks of the fraudsters. 

Right after minimal-key beginnings “taking above great names from avid gamers,” the community moved on in 2016 to crypto wallets, then on to having more than celebrity Twitter accounts, one thing they’ve been carrying out for “a pretty long time,” Nixon mentioned. “The sample of actions matches with OGusers’ totally strange sample of habits.”

In addition to running phishing campaigns, OGers are regarded for their insider recruitment strategies — which incorporate contacting workers to solicit data, spamming purchaser assistance reps with delivers to make huge cash and even socializing with them at events to entice them into for-earnings strategies.

Nixon’s first instinct about the Twitter assault proved exact – quickly after the attack, warnings commenced heading up in the OGuser community not to sell just one-letter accounts. Soon afterward, members of the team commenced spilling details to journalists. Nixon would alternatively associates of the group report what they know to the FBI and create regardless of what proof they have as an alternative of just dishing to the press. “The initial individual who snitches gets the best plea offer,” she pointed out.

Ilia Kolochenko, founder and CEO of ImmuniWeb, said that crediting the full accomplishment of the assault — which he called “unprecedentedly disrupting” — to “comparatively banal social engineering” is questionable. “Hijacking 1 or two accounts by tricking Twitter tech help would seem reasonably plausible, but the extensive-lasting takeover of dozens of top rated accounts necessitates a significantly extra complex and multidimensional planning of attack,” he mentioned.

The documented social engineering assault vector likely “was enhanced by exploitation of other weaknesses in Twitter’s interior security. It is not excluded that the attackers have been assisted by an insider or had been exploiting a substantial-chance vulnerability detected in just one of the Twitter’s web methods,” Kolochenko continued. “Otherwise, we may possibly reasonably infer that Twitter has pretty much no interior security controls and best practices that we ought to normally expect from a tech company of its dimension.”

Previous Post: «Cyber Security News US Banks Can Now Provide Crypto Custody Companies
Next Post: Florida Tax Office Blames Data Breach on Virus Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.