Revealing details about the hack that Twitter encountered last week, the company said that the hack has targeted 130 accounts including those of Elon Musk, Jeff Bezos and Joe Bidden. The people behind them were also able to reset the password of 45 users of those accounts.
In a blog post, the company disclosed that the hackers also downloaded the account information of 8 accounts using the “Your Twitter Data” tool. The hack which targeted many of its high-profile users, such as Warren Buffett and Barack Obama, and further said that no data was downloaded from any of the verified accounts.
Also Read: Twitter is All Set to Bring Back Blue Tick Verification Feature
Twitter in its blog post said, “We’re embarrassed, we’re disappointed, and more than anything, we’re sorry. We know that we must work to regain your trust, and we will support all efforts to bring the perpetrators to justice.”
Those who are not aware, a group of hackers attacked the website and broke into the accounts of celebrities, world leaders and business tycoons in one of the biggest security breaches highlighted in recent times. The attackers sent tweets from the accounts of many of these public figures asking them to send $1,000 in an anonymous Bitcoin address and in return, they will send back $2,000 to them.
Talking on the matter over an email, Allison Nixon, Chief Research Officer at a cybersecurity firm 221B said, “the people behind the attack appear to have come from the “OG” community, a group interested in original, short Twitter handles such as @a, @b or @c, for instance. Based upon what we have seen, the motivation for the most recent Twitter attack is similar to previous incidents we have observed in the OG community — a combination of financial incentive, technical bragging rights, challenge, and disruption.”
“Based upon what we have seen, the motivation for the most recent Twitter attack is similar to previous incidents we have observed in the OG community — a combination of financial incentive, technical bragging rights, challenge, and disruption,” Nixon wrote.
Also Read: Reliance Jio Bags $4.5 Billion Investment from Google
“The OG community is not known to be tied to any nation-state. Rather they are a disorganized crime community with a basic skill set and are a loosely organized group of serial fraudsters.”
While this attack did not appear to go further than the Bitcoin ruse — at least for now — it raises questions about Twitter’s ability to secure its service against election interference and misinformation ahead of the U.S. presidential election.
“Entire markets and potentially elections may be manipulated or altered in this way,” Nixon said.
“Victims of account takeovers generally do not know that the fraud has occurred, and generally cannot take security precautions to prevent it.”
Modern businesses need software consulting because it enables companies to use technology to enhance operations and accomplish their strategic goals. The needs of today’s fast-paced corporate world, however, cannot be satisfied using the conventional ways of software consulting. Several firms are using systematic software consulting transformation technologies to address these issues. By automating repetitive operations, […]
A/B testing is most commonly known as split testing and it is referred as a randomized experimentation process where two or more versions of a web page, page elements, products, etc are targeted to distinctive segments of website visitors simultaneously to evaluate and qualify the suitable version to create the maximum impact to drive business […]
We live in an era where not only data is involved but also the units or devices are also a paramount part of the ecosystem and the universe of interconnected devices known as the Internet of Things (IoT) exchanges data across wired or wireless networks. These gadgets could be micro size to mega size starting […]
We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also disclose information about your use of our site with our social media, advertising and analytics partners. Additional details are available in our Cookie Policy
Name *
Email *
Contact Number
Query *