High Profile Twitter Users Hacked

Hackers pumping a crypto giveaway scam appear to have compromised the Twitter accounts of leading crypto currency exchanges and prominent individuals. The targeted victims found their Twitter accounts had been hacked  in one of the most widespread attacks on the platform has ever seen.

The hackers took over the victims' accounts in an attempt to promote a bitcoin scam that would appear to be earning its creators a lot of money.

Twitter has confirmed it took the drastic step of blocking new tweets from every verified user, compromised or no, as well as locking all compromised accounts. Hacked accounts included President Barack Obama, Joe Biden, Elon Musk, Bill Gates, Kanye West, Michael Bloomberg and Apple Corp.

A first wave of attacks hit the Twitter accounts of prominent crypto currency leaders and companies. But the list of victims quickly broadened to include a Who’s Who of Americans in politics, entertainment and tech, in a major show of force by the hackers. Twitter Support tweeted that the posts soliciting crypto currency payments were part of a "coordinated social engineering attack" that successfully targeted Twitter employees with access to internal systems and tools.

Twitter quickly removed many of the messages, but in some cases similar tweets were sent again from the same accounts, suggesting that Twitter was powerless to regain control.

The scam has attracted the attention of the FBI who issued a statement saying "We are aware of today's security incident involving several Twitter accounts belonging to high profile individuals...The accounts appear to have been compromised in order to perpetrate crypto currency fraud. We advise the public not to fall victim to this scam by sending crypto currency or money in relation to this incident."

Twitter said that it immediately locked down the affected accounts and removed the tweets posted by the attackers while taking further action to prevent other verified accounts that had not shown evidence of being compromised from tweeting or changing their passwords.  

Twitter:       Coin Desk:       UPI:      CNN:        New York Times:      Snopes:       The Verge

You Might Also Read:

Hackers Are Selling Your Social Media Data

 

« Huawei 5G Ordered Out Of UK Networks
Confirmed: US Cyber Attack On Russia In 2018 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

SAM Seamless Network

SAM Seamless Network

SAM Seamless Network is a cybersecurity technology platform that protects the connected home, by tackling cyber security threats at the source.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.