Hackers Compromise Indian Prime Minister's Twitter Account

The personal Twitter account of India's Prime Minister Narendra Modi has been compromised  and  government officials are urgently investigating how his account was hacked. 

Attackers were able to hack into the social media account on December 11 and tweeted messages to his more than 73 million followers.

The messages falsely claimed that India would be adopting Bitcoin as its official currency and that the Indian government had bought 500 Bitcoin tokens and would distribute them across the country. 

The false statements included a link to a malicious website designed to appear as though it was part of the Bitcoin giveaway promotion. Shortly after the illegitimate tweet was posted, it was deleted from the account. The fake tweets were entirely contrary to previous statements made by the Indian government will refuse to recognise   Bitcoin as a currency in the country. 

After the attack, the Office of the Prime Minister of India issued a tweet of its own informing the public that the tweets were false and to disregard any communications shared by the perpetrators. 

A Twitter spokesperson told the Wall Street Journal that it had secured Modi’s account “as soon as we became aware of this activity.” Twitter said no other accounts were compromised in the incident. Twitter said that it had secured Modi’s account once it became aware of the unauthorized activity. No other accounts were compromised in the incident. 

The identities of the hackers are currently unknown. An investigation into the Twitter hack has been launched by the police in India. 

Twitter hackers targeting accounts of prominent individuals isn’t something new. In fact, there have been several high-profile cases of social media accounts like Twitter of celebrities, politicians, and sports personalities that have been breached over the years. While celebrities who’ve had their social media pieces hacked did not have such a huge impact on their followers, it’s a different and more serious issue when politicians get their accounts hacked. 

It is not the first time that senior government Twitter accounts has been compromised. Last year, the Indian Prime Minister’s relief fund was taken over and a series of fake tweets were sent out seeking donations to an account belonging to the hackers. Followers were asked in a series of tweets to donate to India’s National Relief Fund through crypto currency.

In in July 2020, US presidential candidate Joe Biden, former US President Barack Obama and Tesla CEO Elon Musk had their accounts taken over and used to solicit digital currency and a number of tech billionaires including Amazon CEO Jeff Bezos and Microsoft co-founder Bill Gates. Celebrities Kanye West and his wife, Kim Kardashian West, were also hacked.

India is in the process of formulating  a national Cyber Crisis Management Plan to countering cyber attacks and extortion for implementation by all ministries and departments.

Times of India:    Techwire Asia:    Oodaloop:     Infosecurity Magazine:     WSJ:     

Al Jazeera:     JIOForme:    NCSN:

You Might Also Read: 

Financial Fraud Using Fake Celebrity Endorsements:

 

« Penetration Testing & Ethical Hackers
Toolbox For Outlook Password Is Unrivaled »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

VMRay

VMRay

VMRay delivers advanced threat analysis and detection that combines a unique agentless hypervisor-based network sandbox with a real-time reputation engine.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

JobStreet.com

JobStreet.com

JobStreet is one of Asia’s leading online employment marketplaces in Malaysia, Philippines, Singapore, Indonesia and Vietnam.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

Coralogix

Coralogix

Coralogix are rebuilding the path to observability using a real-time streaming analytics pipeline that provides monitoring, visualization, and alerting capabilities without the burden of indexing.

Josef Ressel Centre for Intelligent & Secure Industrial Automation

Josef Ressel Centre for Intelligent & Secure Industrial Automation

The Josef Ressel Centre for Intelligent and Secure Industrial Automation investigates the fundamentals of digital assistants for industrial machines that enable intelligent and secure operation.

Revytech

Revytech

Revytech is a tech company providing services in a broad range of areas including IT operations, cyber security and network engineering.

Blue Mantis

Blue Mantis

Blue Mantis is a security-first, IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization.

Decent Cybersecurity

Decent Cybersecurity

Decent Cybersecurity is a forerunner and proven partner in the field of cybersecurity, utilizing AI, post-quantum cryptography and quantum resistant blockchain for data protection enhancement.