Donald Trump Had His Twitter Account Hacked

Recently, a well-known Dutch cyber investigator claims to have gained access to Donald Trump's Twitter account with the password 'MAGA2020!'
 
Dutch police have questioned the  security researcher, who said he successfully logged into the US president's Twitter account by guessing his password.  The researcher, named as Victor Gevers, had access to Trump’s personal messages, could post tweets in his name and change his profile. Gevers took screenshots when he had access to Trump’s account. 
 
The White House denied it had happened and Twitter said it had no evidence of a hack. However,  Mr Gevers has now revealed more information to back up his claims. 
 
As part of the police interrogation, he has revealed for the first time that he had substantially more evidence of the "hack" than he had previously released. He did not reveal exactly what information he had, but by logging in to somebody's Twitter account someone would in theory be able to:  
 
  • See and send private messages
  • See tweets that the user had privately bookmarked
  • Gain access information such as how many people the account holder had blocked
  • Download an archive of all the user's data, including photos and messages.
Allegedly gaining access to Trump’s Twitter meant Gevers was suddenly able to connect with 87 million users, the number of Trump’s followers. “I expected to be blocked after four failed attempts. Or at least would be asked to provide additional information,” Gevers told De Volkstrant newspaper. 
 
Police would first prove that the hack happened and if prosecutors consider Mr Gevers' actions to be illegal he could face up to four years in prison.
 
Mr Gevers says he was doing a semi-regular sweep of the Twitter accounts of high-profile US election candidates on 16 October when he guessed President Trump's password. He did not post any tweets or change any settings, but said he took screenshots of some parts of the president's account. He said he had spent days trying to contact the Trump campaign to warn them about their security, which was lacking extra safeguards like two-factor authentication, before going to the press.
 
Two-factor authentication is a widely-used security system that links a phone app or number to an account, to add an extra step to the process of logging in. The US president's account is apparently now secure.
 
Volksrant:     Volksrant:        Security Magazine:           BBC:           Guardian:
 
You Might Also Read: 
 
High Profile Twitter Users Hacked:
 
« How The Internet Has Transformed Our Lives
Cyber Security Has Become Critical For National Security »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Omerta

Omerta

Omerta is a global security technology and services company. We advise, consult, design, build, mitigate, protect, manage, provide and train to protect from increasing cyber threats.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

TeskaLabs

TeskaLabs

TeskaLabs is a software vendor of cybersecurity and data privacy products.

Exire Technologies

Exire Technologies

Exire Technologies is comprised of a team of professionals who are specialised in cybersecurity and a value added reseller and integrator of ICT security systems.

Blu Venture Investors (BVI)

Blu Venture Investors (BVI)

Blu Venture Investors is a venture capital firm that supports early stage companies with a focus on technology in diverse domains including cybersecurity, IoT, defense and homeland security.

Fortress Information Security

Fortress Information Security

Fortress Information Security is one of the largest cyber security providers of supply chain risk management and vulnerability risk management in the US.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Cyber and Fraud Centre – Scotland

Cyber and Fraud Centre – Scotland

The Cyber and Fraud Centre – Scotland exists to ensure Scottish organisations are as resilient as they can be against cyber and fraud crime.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.

Socket

Socket

Socket protects software applications and critical services from malware and security threats originating in open source code.

SafetyDetectives

SafetyDetectives

SafetyDetectives' mission is to give our readers accurate and valuable information so they can make informed decisions about staying safe, secure and protected on the internet.