Hackers Compromise Indian Prime Minister's Twitter Account

The personal Twitter account of India's Prime Minister Narendra Modi has been compromised  and  government officials are urgently investigating how his account was hacked. 

Attackers were able to hack into the social media account on December 11 and tweeted messages to his more than 73 million followers.

The messages falsely claimed that India would be adopting Bitcoin as its official currency and that the Indian government had bought 500 Bitcoin tokens and would distribute them across the country. 

The false statements included a link to a malicious website designed to appear as though it was part of the Bitcoin giveaway promotion. Shortly after the illegitimate tweet was posted, it was deleted from the account. The fake tweets were entirely contrary to previous statements made by the Indian government will refuse to recognise   Bitcoin as a currency in the country. 

After the attack, the Office of the Prime Minister of India issued a tweet of its own informing the public that the tweets were false and to disregard any communications shared by the perpetrators. 

A Twitter spokesperson told the Wall Street Journal that it had secured Modi’s account “as soon as we became aware of this activity.” Twitter said no other accounts were compromised in the incident. Twitter said that it had secured Modi’s account once it became aware of the unauthorized activity. No other accounts were compromised in the incident. 

The identities of the hackers are currently unknown. An investigation into the Twitter hack has been launched by the police in India. 

Twitter hackers targeting accounts of prominent individuals isn’t something new. In fact, there have been several high-profile cases of social media accounts like Twitter of celebrities, politicians, and sports personalities that have been breached over the years. While celebrities who’ve had their social media pieces hacked did not have such a huge impact on their followers, it’s a different and more serious issue when politicians get their accounts hacked. 

It is not the first time that senior government Twitter accounts has been compromised. Last year, the Indian Prime Minister’s relief fund was taken over and a series of fake tweets were sent out seeking donations to an account belonging to the hackers. Followers were asked in a series of tweets to donate to India’s National Relief Fund through crypto currency.

In in July 2020, US presidential candidate Joe Biden, former US President Barack Obama and Tesla CEO Elon Musk had their accounts taken over and used to solicit digital currency and a number of tech billionaires including Amazon CEO Jeff Bezos and Microsoft co-founder Bill Gates. Celebrities Kanye West and his wife, Kim Kardashian West, were also hacked.

India is in the process of formulating  a national Cyber Crisis Management Plan to countering cyber attacks and extortion for implementation by all ministries and departments.

Times of India:    Techwire Asia:    Oodaloop:     Infosecurity Magazine:     WSJ:     

Al Jazeera:     JIOForme:    NCSN:

You Might Also Read: 

Financial Fraud Using Fake Celebrity Endorsements:

 

« Penetration Testing & Ethical Hackers
Toolbox For Outlook Password Is Unrivaled »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

Empiric

Empiric

Empiric is a multi-award winning technology and transformation recruitment agency specialising in data, digital, cloud and security.

SpyCloud

SpyCloud

SpyCloud is a leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts either directly or through product integrations.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

Energia Ventures

Energia Ventures

Energia Ventures is a three-month intensive accelerator for entrepreneurs with an innovative business in the energy, smart grid, cleantech, and cybersecurity sectors.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

AWARE7

AWARE7

IT security for human and machine. With the help of our products and services, we work with you to increase the IT security level of your organization.

Indevtech

Indevtech

Indevtech has been serving Hawaii since 2001, providing end-to-end managed IT services to small- and medium-businesses.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.