Elon Musk's Deal To Buy Twitter Comes To A Standstill

Elon Musk, the world's richest man, had said that one of his priorities would be to remove "spam bots" from Twitter and now he has disclosed that his $44bn (£35bn) deal to buy Twitter is on hold after he queried the number of fake or spam accounts on the social media platform.

In a tweet, he said he was waiting for information "supporting the calculation that spam/fake accounts do indeed represent less than 5% of users".

The initial stock market response was to send Twitter stock plunging 25%, as analysts speculated that Musk is trying to negotiate a lower price for the deal or pull out completely. The Tesla and Space-X founder is waiting to have the details supporting Twitter’s assertion that fake accounts accounted for fewer than 5% of its daily active users during the first three months of this year.

Musk has been widely reported for his criticisms of the way Twitter has been run and about the need to clean up fake accounts. Mr Musk has called for "defeating the spam bots" on Twitter as well as several other changes, including bringing back some banned accounts such as that of former US President Donald Trump. 

There is now some real doubt that the transaction will proceed, although Musk said in a subsequent tweet that he was “still committed to acquisition. 

Twitter says that in working out the percentage of spam accounts, "it applied significant judgment, so our estimation of false or spam accounts may not accurately represent the actual number of such accounts... The actual number of false or spam accounts could be higher than we have estimated. We are continually seeking to improve our ability to estimate the total number of spam accounts." 

Twitter had issues with automated, fake accounts being used to post misleading content for a long time and the company does admit there are false or spam accounts on the platform. It has carried out an internal review of a sample of accounts and estimated the average number of false or spam accounts during the first quarter of 2022. “The false or spam accounts for a period represents the average of false or spam accounts in the samples during each monthly analysis period during the quarter,” said Twitter in its First Quarter 2022 Results. 

Some commentators suggest that if Mr Musk does still decide to go ahead with the deal, a renegotiation of the price and other terms seems likely.

Other analysts questioned why Musk would suddenly express concern about Twitter's estimate that 5 percent of accounts are fake, an estimate that the company has included in regulatory filings for years. Under the terms of the deal, if either Twitter or Mr Musk walk away they must pay the other side a termination fee of $1bn

Elon Musk/Twitter:    Twitter:    Reuters:    NDTV:     BBC:    Guardian:    Daily Mail:      Independent:   

You Might Also Read: 

Twitter, Free Speech & Disinformation:

 

« Why Data Storage Is the Number One Cyber Recovery Strategy
A Short History Of Cyber Crime - Part 1- Its Motivations »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The Networking People (TNP)

The Networking People (TNP)

TNP supplies independent advice allowing large organisations to design, build and operate their own networks independently of the established telecoms companies.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

Identillect Technologies

Identillect Technologies

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

LATRO Services

LATRO Services

LATRO Services is a complete solution provider to discover, locate, and eliminate telecom fraud.

TES

TES

TES is a provider of IT Lifecycle Services, offering bespoke solutions that help customers manage the commissioning, deployment and retirement of Information Technology assets.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

ANSEC IA

ANSEC IA

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally.

AwareGO

AwareGO

AwareGO is a global provider of security awareness training content and solutions that help enterprises improve cybersecurity awareness in the workplace.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

EVVO LABS

EVVO LABS

EVVO Labs empower your business with the latest IT capabilities to get you ahead of your competitors. We are experts at converging technologies to build your digital transformation.