Donald Trump Had His Twitter Account Hacked

Recently, a well-known Dutch cyber investigator claims to have gained access to Donald Trump's Twitter account with the password 'MAGA2020!'
 
Dutch police have questioned the  security researcher, who said he successfully logged into the US president's Twitter account by guessing his password.  The researcher, named as Victor Gevers, had access to Trump’s personal messages, could post tweets in his name and change his profile. Gevers took screenshots when he had access to Trump’s account. 
 
The White House denied it had happened and Twitter said it had no evidence of a hack. However,  Mr Gevers has now revealed more information to back up his claims. 
 
As part of the police interrogation, he has revealed for the first time that he had substantially more evidence of the "hack" than he had previously released. He did not reveal exactly what information he had, but by logging in to somebody's Twitter account someone would in theory be able to:  
 
  • See and send private messages
  • See tweets that the user had privately bookmarked
  • Gain access information such as how many people the account holder had blocked
  • Download an archive of all the user's data, including photos and messages.
Allegedly gaining access to Trump’s Twitter meant Gevers was suddenly able to connect with 87 million users, the number of Trump’s followers. “I expected to be blocked after four failed attempts. Or at least would be asked to provide additional information,” Gevers told De Volkstrant newspaper. 
 
Police would first prove that the hack happened and if prosecutors consider Mr Gevers' actions to be illegal he could face up to four years in prison.
 
Mr Gevers says he was doing a semi-regular sweep of the Twitter accounts of high-profile US election candidates on 16 October when he guessed President Trump's password. He did not post any tweets or change any settings, but said he took screenshots of some parts of the president's account. He said he had spent days trying to contact the Trump campaign to warn them about their security, which was lacking extra safeguards like two-factor authentication, before going to the press.
 
Two-factor authentication is a widely-used security system that links a phone app or number to an account, to add an extra step to the process of logging in. The US president's account is apparently now secure.
 
Volksrant:     Volksrant:        Security Magazine:           BBC:           Guardian:
 
You Might Also Read: 
 
High Profile Twitter Users Hacked:
 
« How The Internet Has Transformed Our Lives
Cyber Security Has Become Critical For National Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

FireEye

FireEye

FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

Braintrace

Braintrace

Braintrace’s services include Managed Detection and Response (MDR), Managed SIEM, SIEM-as-a-Service, SOC-as-a-Service, Advisory Services, and Incident Response.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

Narf Industries

Narf Industries

Narf Industries are a small group of reverse engineers, vulnerability researchers and tool developers that specialize in tailored solutions for government and large enterprises.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

We Hack Purple

We Hack Purple

We Hack Purple is a Canadian company dedicated to helping anyone and everyone create secure software.

Treacle Technologies

Treacle Technologies

Treacle Technologies are a Cyber Security startup with a focus on Defensive Security.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.