Donald Trump Had His Twitter Account Hacked

Recently, a well-known Dutch cyber investigator claims to have gained access to Donald Trump's Twitter account with the password 'MAGA2020!'
 
Dutch police have questioned the  security researcher, who said he successfully logged into the US president's Twitter account by guessing his password.  The researcher, named as Victor Gevers, had access to Trump’s personal messages, could post tweets in his name and change his profile. Gevers took screenshots when he had access to Trump’s account. 
 
The White House denied it had happened and Twitter said it had no evidence of a hack. However,  Mr Gevers has now revealed more information to back up his claims. 
 
As part of the police interrogation, he has revealed for the first time that he had substantially more evidence of the "hack" than he had previously released. He did not reveal exactly what information he had, but by logging in to somebody's Twitter account someone would in theory be able to:  
 
  • See and send private messages
  • See tweets that the user had privately bookmarked
  • Gain access information such as how many people the account holder had blocked
  • Download an archive of all the user's data, including photos and messages.
Allegedly gaining access to Trump’s Twitter meant Gevers was suddenly able to connect with 87 million users, the number of Trump’s followers. “I expected to be blocked after four failed attempts. Or at least would be asked to provide additional information,” Gevers told De Volkstrant newspaper. 
 
Police would first prove that the hack happened and if prosecutors consider Mr Gevers' actions to be illegal he could face up to four years in prison.
 
Mr Gevers says he was doing a semi-regular sweep of the Twitter accounts of high-profile US election candidates on 16 October when he guessed President Trump's password. He did not post any tweets or change any settings, but said he took screenshots of some parts of the president's account. He said he had spent days trying to contact the Trump campaign to warn them about their security, which was lacking extra safeguards like two-factor authentication, before going to the press.
 
Two-factor authentication is a widely-used security system that links a phone app or number to an account, to add an extra step to the process of logging in. The US president's account is apparently now secure.
 
Volksrant:     Volksrant:        Security Magazine:           BBC:           Guardian:
 
You Might Also Read: 
 
High Profile Twitter Users Hacked:
 
« How The Internet Has Transformed Our Lives
Cyber Security Has Become Critical For National Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Ericsson

Ericsson

Ericsson is a leading provider of telecommunications services and network infrastructure solutions including all aspects of network security.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Government Communications Security Bureau (GCSB)

Government Communications Security Bureau (GCSB)

GCSB contributes to New Zealand’s national security by providing information assurance and cyber security to the New Zealand Government and critical infrastructure organisations.

4Stop

4Stop

4Stop is a global KYC, compliance and anti-fraud risk management company.

Intrinsyc Technologies

Intrinsyc Technologies

Intrinsyc provides product development services and Edge Computing modules that are helping to take the Internet of Things products to the next level.

NINJIO

NINJIO

NINJIO is a leader in cybersecurity awareness training. View IT Security Awareness through a different lens - entertain and educate your users through storytelling.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

AnzenSage

AnzenSage

AnzenSage is a cybersecurity advisory consultancy specializing in security risk resilience for the food sector: agriculture, food manufacturing, food supply chain, vineyards, and wineries.

Highen Fintech

Highen Fintech

Highen is a blockchain software development company with offices in the United States and development centers in India.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.