Donald Trump Had His Twitter Account Hacked

Recently, a well-known Dutch cyber investigator claims to have gained access to Donald Trump's Twitter account with the password 'MAGA2020!'
 
Dutch police have questioned the  security researcher, who said he successfully logged into the US president's Twitter account by guessing his password.  The researcher, named as Victor Gevers, had access to Trump’s personal messages, could post tweets in his name and change his profile. Gevers took screenshots when he had access to Trump’s account. 
 
The White House denied it had happened and Twitter said it had no evidence of a hack. However,  Mr Gevers has now revealed more information to back up his claims. 
 
As part of the police interrogation, he has revealed for the first time that he had substantially more evidence of the "hack" than he had previously released. He did not reveal exactly what information he had, but by logging in to somebody's Twitter account someone would in theory be able to:  
 
  • See and send private messages
  • See tweets that the user had privately bookmarked
  • Gain access information such as how many people the account holder had blocked
  • Download an archive of all the user's data, including photos and messages.
Allegedly gaining access to Trump’s Twitter meant Gevers was suddenly able to connect with 87 million users, the number of Trump’s followers. “I expected to be blocked after four failed attempts. Or at least would be asked to provide additional information,” Gevers told De Volkstrant newspaper. 
 
Police would first prove that the hack happened and if prosecutors consider Mr Gevers' actions to be illegal he could face up to four years in prison.
 
Mr Gevers says he was doing a semi-regular sweep of the Twitter accounts of high-profile US election candidates on 16 October when he guessed President Trump's password. He did not post any tweets or change any settings, but said he took screenshots of some parts of the president's account. He said he had spent days trying to contact the Trump campaign to warn them about their security, which was lacking extra safeguards like two-factor authentication, before going to the press.
 
Two-factor authentication is a widely-used security system that links a phone app or number to an account, to add an extra step to the process of logging in. The US president's account is apparently now secure.
 
Volksrant:     Volksrant:        Security Magazine:           BBC:           Guardian:
 
You Might Also Read: 
 
High Profile Twitter Users Hacked:
 
« How The Internet Has Transformed Our Lives
Cyber Security Has Become Critical For National Security »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

Haechi Audit

Haechi Audit

Haechi Audit is a leading smart contract security audit firm. We provide the most secure smart contract security audit and smart contract development services to our global clients.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

StrikeReady

StrikeReady

StrikeReady have developed CARA, an advanced technology solution that offers personalized and proactive assessment and remediation of future and current risk in real-time.

Prima Cyber Solutions (PCS)

Prima Cyber Solutions (PCS)

Prima Cyber Solutions is focused on protecting your business from the massive and devastating impacts that cyber-attacks may cause.

Trusted Security Solutions (TSS)

Trusted Security Solutions (TSS)

TSS are specialist in IT Security and providing Cybersecurity Solutions & Services combined with storage and backup.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

TIM Enterprise

TIM Enterprise

TIM Enterprise offers innovative, sustainable and secure 360-degree digital solutions to companies and public administrations.

Token Security

Token Security

Token is the new approach designed for the identity boom era. Introducing Machine-First Identity Security.

Scalarr

Scalarr

Scalarr is an innovative, next-generation cyber security firm focused on automation and AI to detect and prevent threats in mobile and Edge/IoT infrastructures.