High Profile Twitter Users Hacked

Hackers pumping a crypto giveaway scam appear to have compromised the Twitter accounts of leading crypto currency exchanges and prominent individuals. The targeted victims found their Twitter accounts had been hacked  in one of the most widespread attacks on the platform has ever seen.

The hackers took over the victims' accounts in an attempt to promote a bitcoin scam that would appear to be earning its creators a lot of money.

Twitter has confirmed it took the drastic step of blocking new tweets from every verified user, compromised or no, as well as locking all compromised accounts. Hacked accounts included President Barack Obama, Joe Biden, Elon Musk, Bill Gates, Kanye West, Michael Bloomberg and Apple Corp.

A first wave of attacks hit the Twitter accounts of prominent crypto currency leaders and companies. But the list of victims quickly broadened to include a Who’s Who of Americans in politics, entertainment and tech, in a major show of force by the hackers. Twitter Support tweeted that the posts soliciting crypto currency payments were part of a "coordinated social engineering attack" that successfully targeted Twitter employees with access to internal systems and tools.

Twitter quickly removed many of the messages, but in some cases similar tweets were sent again from the same accounts, suggesting that Twitter was powerless to regain control.

The scam has attracted the attention of the FBI who issued a statement saying "We are aware of today's security incident involving several Twitter accounts belonging to high profile individuals...The accounts appear to have been compromised in order to perpetrate crypto currency fraud. We advise the public not to fall victim to this scam by sending crypto currency or money in relation to this incident."

Twitter said that it immediately locked down the affected accounts and removed the tweets posted by the attackers while taking further action to prevent other verified accounts that had not shown evidence of being compromised from tweeting or changing their passwords.  

Twitter:       Coin Desk:       UPI:      CNN:        New York Times:      Snopes:       The Verge

You Might Also Read:

Hackers Are Selling Your Social Media Data

 

« Huawei 5G Ordered Out Of UK Networks
Confirmed: US Cyber Attack On Russia In 2018 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

Fidelis Security

Fidelis Security

Fidelis Security is a leading provider of extended threat detection and response (XDR) solutions for your security operations.

Siscon

Siscon

Siscon delivers tailor-made compliance solutions that are based on the customer's specific wishes and reality and then supplement with many years of experience in the field.

UK Cyber Security Forum

UK Cyber Security Forum

UK Cyber Security Forum is a community interest group for cyber security companies in the UK.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

GLESEC

GLESEC

GLESEC offer a complete range of Cyber Security services from Operations & Intelligence Services to Auditing & Compliance and Simulation and Training.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

Carson McDowell

Carson McDowell

Carson McDowell are one of Northern Ireland's leading law firms. We are the law firm of choice for many of Northern Ireland's Top 100 companies as well as international companies doing business here.

Charterhouse Voice & Data

Charterhouse Voice & Data

Charterhouse is your trusted technology partner - designing, provisioning and supporting the technology that underpins your operations including network security and data compliance.

Kintent

Kintent

With Kintent, compliance becomes a habit, is simple to understand and achieve, and is continuously testable so that your customers can see that you are adhering to all your trust obligations.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

Telefonica Global Solutions (TGS)

Telefonica Global Solutions (TGS)

Telefonica Global Solutions is the technological partner of wholesalers and enterprises, helping them to achieve the digitalization they need.

Electrosoft Services

Electrosoft Services

Electrosoft provide mature, innovative technology-based services and solutions to power critical IT programs and keep our nation safe from cybersecurity attacks.

DART Consulting & Training

DART Consulting & Training

DART is a leading cyber training and consultancy company. We enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.