[WATCH] More Strange Details Revealed About Twitter Hack
On Wednesday a major Twitter hack took place compromising some big named accounts, such as Bill Gates, Kanye West, and Elon Musk. The hacked accounts directed people to a cryptocurrency scam via a link. Twitter responded to the hack by locking down verified accounts and not allow users to post until the matter could be further investigated. The big question is how did the hack happen?
Many point out that verified accounts like that of Elon Musk would more than likely be protected with a two-step verification which means that Musk would have to verify his identity through something like his phone number so there must have been another way. A reporter for Motherboard named Joseph Cox was told that the hack involved a Twitter employee who either gave or was tricked into giving their credentials to the hackers. Cox was told by one person allegedly involved in the hack that they had given a Twitter employee money for their credentials.
We detected what we believe to be a coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools.
— Twitter Support (@TwitterSupport) July 16, 2020
There is also the possibility of social engineering being the culprit or the act of phishing which is a possibility alluded to by Twitter in a statement on Twitter. It read, “We detected what we believe to be a coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools. … We know they used this access to take control of many highly-visible (including verified) accounts and Tweet on their behalf. We’re looking into what other malicious activity they may have conducted or information they may have accessed and will share more here as we have it.”
Many believe that the Twitter administration tool was more than likely given over willingly, but it would be better for Twitter if it was the result of trickery because the company could just tighten security measures to prevent future incidents.
Read the full report here.