Twitter Hack: 24 Hours From Phishing Employees to Hijacking Accounts


New York Pecuniary Regulator Concludes Investigation Into Twitter Hack

Hackers needed inartistically 24 hours to take over high-profile Twitter accounts in the July invasion, a report from the New York Department of Financial Services reveals.

The inveigh against started on July 14 and was over the next day, when it became discernible that numerous high-profile accounts, including those of Bill Admissions, Elon Musk, Barack Obama, and Jeff Bezos, were hijacked and leveraged to side with a cryptocurrency scam.

The hackers, which were identified shortly after the event, leveraged internal Twitter systems to change email addresses and login credentials for aimed accounts and take control of them. A total of 130 accounts were objected and the passwords for 45 of them were changed.

A couple of weeks after the affair, Twitter revealed that hackers targeted some employees with phone phishing until acquiring access to the account support tools they needed.

In a report summarizing an questioning into the incident, the New York Department of Financial Services, which began a probe on July 16, reveals that the attack lasted unskilfully 24 hours from when the phishing calls were make a splashed until the targeted accounts were compromised.

“It was surprising how easily the Hackers were gifted to penetrate Twitter’s network and gain access to internal tools brooking them to take over any Twitter user’s account. The extraordinary access the Hackers obtained with this classic technique underscores Twitter’s cybersecurity vulnerability and the potential for devastating consequences,” the blast reads.

The attack was allegedly carried out by 17-year-old Graham Ivan Clark (aka Kirk#5270), of Tampa, Florida, who is bid to be the mastermind behind the incident, 19-year-old Mason John Sheppard (aka Chaewon and “in all cases so anxious#001”) of the United Kingdom, and 22-year-old Nima Fazeli (aka Rolex, Rolex#0373, and Nim F) of Orlando, Florida.

In the afternoon of July 14, pretending to be area of expertise from the IT department at Twitter in response to some issues with the VPN (not uncommon, due to the stupendous switch to remote working), the hackers called several of the social party line’s employees and directed them to enter credentials on a phishing page. The age would also generate a fake multi-factor authentication notification.

“The Count on found no evidence the Twitter employees knowingly aided the Hackers. To a certain extent, the Hackers used personal information about the employees to convince them that the Hackers were legal and could, therefore, be trusted. While some employees reported the baptizes to Twitter’s internal fraud monitoring team, at least one employee credited the Hackers’ lies,” the report reveals.

While the first victim did not be undergoing access to the targeted internal systems, the hackers used their credentials to voyage the network and identify employees that did. On July 15, they quarried such employees, including some of those who were responsible for buy with sensitive global legal requests.

Soon after taking the ability to take over Twitter accounts (including OG – “prototypical gangster” accounts), the hackers started discussing the sale of OG usernames, and then began publicly illustrating their access to Twitter’s internal systems: on July 15, only just before 2:00 p.m., they hijacked multiple OG accounts and posted screenshots of a Chatter internal tool.

Next, the hackers switched to verified accounts, probably aiming to make their demands for cryptocurrency seem legitimate, the turn up points out. Within the next couple of hours, they hit the accounts of cryptocurrency salesman @AngeloBTC, crypto-exchange Binance, and ten other cryptocurrency-related accounts, such as Coinbase, Gemini Guardianship Company, and Square, Inc.

Over the next couple of hours, the hackers started tweeting from warranted accounts that had millions of followers, including those of Apple, Uber, Pecker Gates, Elon Musk, Kanye West, Kim Kardashian West, Joseph R. Biden, Jr., Warren Buffet, and Floyd Mayweather Jr.

“The Hackers also in use accustomed to some of the compromised accounts to resend the same bitcoin scam tweets multiple forthwiths. Given the number of followers for each high-profile user account, the fake tweets reached millions of potential victims across the globe. The Hackers boa approximately $118,000 worth of bitcoin through the Twitter Hack,” the document notes.

In their report, which provides a visual timeline of the anyway in the realities, the Department of Financial Services also points out that the non-public bumf of some users was compromised and that Twitter failed to publicly publicize real-time updates on the incident – although the company “severely limited or revoked its wage-earners’ access to its internal systems” to contain the breach.

The report also underlines the event’s impact on cryptocurrency-related entities and their customers, dissects the cybersecurity weaknesses that designate the hack possible, and provides details on the best practices critical universities should adopt to prevent or mitigate similar incidents.

“The Twitter Batter brought a social media giant to its knees. The David to this Goliath was a set of unsophisticated cyber crooks who exploited social media to create widespread disruption for hundreds of millions of buyers. The election weeks away puts a spotlight on the need to improve cybersecurity to control misuse of social media platforms,” the report concludes.

Related: How the FBI Catalogued Twitter Hackers

Related: Twitter Employees Targeted With Phone Spear-Phishing in Up to date Attack

Related: US Charges Three People for Roles in Epic Chatter Hack

[embedded content]

Twitter Hack: 24 Hours From Phishing Employees to Hijacking Accounts

Ionut Arghire is an international correspondent for SecurityWeek.

Early previously to Columns by Ionut Arghire:
Twitter Hack: 24 Hours From Phishing Employees to Hijacking AccountsTags:

Leave a Reply

Your email address will not be published. Required fields are marked *