Twitter's biggest security breach in history! Multiple accounts hacked, the reason turned out to be a Bitcoin phishing scam

Twitter's biggest security breach in history! Multiple accounts hacked, the reason turned out to be a Bitcoin phishing scam

The accounts of multiple high-profile individuals were hacked after hackers targeted Twitter employees with a Bitcoin phishing scam earlier last week to gain access to their accounts. “The attackers successfully compromised a small number of employees and used their credentials to access Twitter’s internal systems, including through two-factor protection mechanisms.”
The incident has been called the biggest security breach in the company's history.
Twitter released a full blog revealing the hacked account information, including US Democratic presidential candidate Joe Biden, former President Barack Obama, Tesla CEO Elon Musk, Microsoft co-founder Bill Gates, Kanye West, Michael Bloomberg, etc.

Screenshot from Obama's previous post: All bitcoins sent to my account will be returned double. Send $1,000 and I will return $2,000.
According to Twitter's official description, hackers can directly see and download the data archives of these accounts, such as phone numbers, emails, and private direct messages (DM). Moreover, hackers may even be able to obtain the DMs that these eight accounts tried to delete, because Twitter will store DMs on its servers as long as any party in the conversation stores them on its servers. These messages can contain other personal information such as addresses, images, videos, etc.
However, the good news is that Twitter claims that none of the eight accounts are verified accounts, which means that the individuals represented by the eight accounts do not reveal personal information on the accounts.
Twitter also said that the hackers initially targeted 130 accounts and successfully triggered password resets from 45 of them and logged in to post tweets. In the end, the hackers only tried to download data from up to 8 unverified accounts. "It is impossible to know how many accounts the hackers scanned for personal information, or whether they may have accessed or read only these private messages."
Currently, Twitter has given a solution of locking the access rights of all verified accounts (130). In the future, after restoring these locked accounts, it plans to continue investigations with law enforcement agencies, strengthen security mechanisms, and conduct internal security training for employees.
After the incident, some media said that the Twitter attack would sound the alarm for the US presidential election in November. Four years after the American people learned that elections could be easily manipulated through media, the country still does not have relatively complete protection measures. Twitter should be clearly aware that it is likely to become a target of attack again in the future and be prepared for various emergencies.
According to the New York Times, the attack was initially a prank by three young hackers. The attack began with a user named "Kirk" who boasted to two teenagers that he could access the accounts of celebrities. The other two teenagers, "lol" and "ever so sear", admitted to participating in the hacking attack. The identity of "Kirk" is still unknown.
It is understood that the 21-year-old British famous hacker Joseph O'Connor was accused of being Kirk's true identity, but there is no conclusive evidence. (Leifeng.com)

<<:  Multi-dimensional analysis: Understanding the mystery and situation of Filecoin in one article (Part 1)

>>:  Do you know the hidden dangers of Filecoin explosion?

Recommend

What will happen to the mining industry under high pressure?

Recent news has shown that the rectification of t...

What does a confident person look like? See if they are not blindly confident.

We often say that we should have confidence in ou...

What moles can women look at to know if their marriages are unhappy

In fact, everyone has more or less moles on their...

What is the significance of the length of the lifeline?

What is the special meaning of the length of the ...

What are the moles on the five fingers?

As one of the traditional physiognomy techniques, ...

Talented people will become great

Talented and destined to be great Sometimes, besi...

What kind of face is so powerful inside? It's so cruel and ruthless

Some people appear amiable on the surface, but ar...

AdBit to launch AdBit Coin ICO by the end of this year

Rage Review : AdBit, a subsidiary of Canadian blo...

Your fortune depends on your face

From the perspective of numerology, everyone'...

Which moles on the face are bad?

1. Moles on eyelashes In physiognomy, which moles...

What does the career line fork mean?

There is a career line on the palm of your hand. ...