Donald Trump Had His Twitter Account Hacked

Recently, a well-known Dutch cyber investigator claims to have gained access to Donald Trump's Twitter account with the password 'MAGA2020!'
 
Dutch police have questioned the  security researcher, who said he successfully logged into the US president's Twitter account by guessing his password.  The researcher, named as Victor Gevers, had access to Trump’s personal messages, could post tweets in his name and change his profile. Gevers took screenshots when he had access to Trump’s account. 
 
The White House denied it had happened and Twitter said it had no evidence of a hack. However,  Mr Gevers has now revealed more information to back up his claims. 
 
As part of the police interrogation, he has revealed for the first time that he had substantially more evidence of the "hack" than he had previously released. He did not reveal exactly what information he had, but by logging in to somebody's Twitter account someone would in theory be able to:  
 
  • See and send private messages
  • See tweets that the user had privately bookmarked
  • Gain access information such as how many people the account holder had blocked
  • Download an archive of all the user's data, including photos and messages.
Allegedly gaining access to Trump’s Twitter meant Gevers was suddenly able to connect with 87 million users, the number of Trump’s followers. “I expected to be blocked after four failed attempts. Or at least would be asked to provide additional information,” Gevers told De Volkstrant newspaper. 
 
Police would first prove that the hack happened and if prosecutors consider Mr Gevers' actions to be illegal he could face up to four years in prison.
 
Mr Gevers says he was doing a semi-regular sweep of the Twitter accounts of high-profile US election candidates on 16 October when he guessed President Trump's password. He did not post any tweets or change any settings, but said he took screenshots of some parts of the president's account. He said he had spent days trying to contact the Trump campaign to warn them about their security, which was lacking extra safeguards like two-factor authentication, before going to the press.
 
Two-factor authentication is a widely-used security system that links a phone app or number to an account, to add an extra step to the process of logging in. The US president's account is apparently now secure.
 
Volksrant:     Volksrant:        Security Magazine:           BBC:           Guardian:
 
You Might Also Read: 
 
High Profile Twitter Users Hacked:
 
« How The Internet Has Transformed Our Lives
Cyber Security Has Become Critical For National Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

International Association of Security Awareness Professionals (IASAP)

International Association of Security Awareness Professionals (IASAP)

IASAP provides a members-only virtual sharing platform where security awareness professionals engage in a lively, year-round exchange of information and ideas.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

SECUINFRA

SECUINFRA

SECUINFRA has been supporting companies in detecting, analyzing and defending against cyber attacks since 2010.

Asimily

Asimily

Asimily’s IoMT risk remediation platform holistically secures the mission-critical healthcare devices that deliver safe and reliable care.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Tryaq

Tryaq

Tryaq are a group of cybersecurity experts and enthusiasts who share the mission to make the world feel safer online.

CyberSecureRIA

CyberSecureRIA

We founded CyberSecureRIA specifically to secure and support RIAs. We exist to secure SEC-registered RIAs, and keep them compliant with cybersecurity regulations.

GO Business

GO Business

GO Business are a specialised B2B team within GO that caters to the communication needs of the local business community in Malta.

CelcomDigi

CelcomDigi

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building.