Twitter hackers manipulated staff to access systems

0
127
Twitter hackers manipulated staff to access systems


A photo illustration shows a range of celebrities - Kim Kardashian, Joe Biden, Elon Musk, Barack Obama, Kanye West, and Jeff Bezos - arrayed around a shattered glass image with the Twitter logo at its cetnre

Image copyright
Reuters / AFP

Twitter has confirmed hackers made use of tools that were supposed to have only been available to its own staff to carry off Wednesday’s hack attack.

The breach saw the accounts of Barack Obama, Elon Musk, Kanye West and Bill Gates among other celebrities used to tweet a Bitcoin scam.

Twitter also revealedthe perpetrators had downloaded data from up to eight of the accounts involved.

It declined to reveal their identities but said none of them were “verified”.

This means they did not have a blue tick to confirm their ownership, and thus were not among the most high-profile hacked accounts.

However, the fact the attackers were able to make use of the Your Twitter Data download toolmeans they now potentially have access toaffected users’:

  • private direct messages, including photos and videos
  • contacts, which Twitter’s app would have imported from their smartphone address books
  • physical location history, logged at times they had used the service
  • details about the accounts they had muted and blocked
  • interest and demographic information Twitter had inferred about them via their use of its platform

In a further development, the New York Times has suggested that the social network became exposed after the hackers gained access to credentials that had been shared on Twitter’s internal Slack messaging channel – a service that some companies use as an alternative to email.

The newspaper also suggests that at least two of those involved are from England.

In total, Twitter said 130 accounts had been targeted, of which the hackers had managed to reset the passwords of 45, giving them control.

It added that it believed those responsible may have attempted to sell some of the pilfered usernames.

“The attackers successfully manipulated a small number of employees and used their credentials to access Twitter’s internal systems,” it said in a statement.

“We are continuing our investigation of this incident, working with law enforcement, and determining longer-term actions we should take to improve the security of our systems.”

It added: “We’re embarrassed, we’re disappointed, and more than anything, we’re sorry.”

How did the attack unfold?

Twitter said the attackers had targeted certain Twitter employees through a “social engineering scheme”.

“In this context, social engineering is the intentional manipulation of people into performing certain actions and divulging confidential information,” it said.

A small number of staff had been successfully manipulated, it said.

Once inside Twitter’s internal systems, the hackers were not able to see users’ previous passwords but could access personal information including email addresses and phone numbers as these are visible to staff using internal support tools.

They may also have been able to view additional information, the company said. There has been speculation that this could include direct messages.

The private messages of Kanye West, Kim Kardashian West or Elon Musk could be worth money on dark web forums. Selling the private messages of presidential hopeful Joe Biden or f

Real More »