High Profile Twitter Users Hacked

Hackers pumping a crypto giveaway scam appear to have compromised the Twitter accounts of leading crypto currency exchanges and prominent individuals. The targeted victims found their Twitter accounts had been hacked  in one of the most widespread attacks on the platform has ever seen.

The hackers took over the victims' accounts in an attempt to promote a bitcoin scam that would appear to be earning its creators a lot of money.

Twitter has confirmed it took the drastic step of blocking new tweets from every verified user, compromised or no, as well as locking all compromised accounts. Hacked accounts included President Barack Obama, Joe Biden, Elon Musk, Bill Gates, Kanye West, Michael Bloomberg and Apple Corp.

A first wave of attacks hit the Twitter accounts of prominent crypto currency leaders and companies. But the list of victims quickly broadened to include a Who’s Who of Americans in politics, entertainment and tech, in a major show of force by the hackers. Twitter Support tweeted that the posts soliciting crypto currency payments were part of a "coordinated social engineering attack" that successfully targeted Twitter employees with access to internal systems and tools.

Twitter quickly removed many of the messages, but in some cases similar tweets were sent again from the same accounts, suggesting that Twitter was powerless to regain control.

The scam has attracted the attention of the FBI who issued a statement saying "We are aware of today's security incident involving several Twitter accounts belonging to high profile individuals...The accounts appear to have been compromised in order to perpetrate crypto currency fraud. We advise the public not to fall victim to this scam by sending crypto currency or money in relation to this incident."

Twitter said that it immediately locked down the affected accounts and removed the tweets posted by the attackers while taking further action to prevent other verified accounts that had not shown evidence of being compromised from tweeting or changing their passwords.  

Twitter:       Coin Desk:       UPI:      CNN:        New York Times:      Snopes:       The Verge

You Might Also Read:

Hackers Are Selling Your Social Media Data

 

« Huawei 5G Ordered Out Of UK Networks
Confirmed: US Cyber Attack On Russia In 2018 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Cyber adAPT

Cyber adAPT

Cyber adAPT offers a leading network threat detection platform (NTD) to the enterprise and ODM/OEM markets.

Advanced Resource Managers (ARM)

Advanced Resource Managers (ARM)

ARM provide specialist recruitment services for technology and engineering including cyber security.

Netsparker

Netsparker

Netsparker provide a web application security scanner to automatically find security flaws in your websites, web applications and web services.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Assac Networks

Assac Networks

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

Diateam

Diateam

Diateam is an R&D company specializing in computer security. Diateam develops highly innovative cyber range platforms and Industry-leading systems for cybersecurity training and testing labs.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

Wontok

Wontok

Wontok deliver innovative value-added data security services that fill the gaps left in traditional security solutions.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

PRE Security

PRE Security

PRE Security is leading the transition into the next era of AI cybersecurity with a new model: Predict & Prevent.