Hackers Compromise Indian Prime Minister's Twitter Account

The personal Twitter account of India's Prime Minister Narendra Modi has been compromised  and  government officials are urgently investigating how his account was hacked. 

Attackers were able to hack into the social media account on December 11 and tweeted messages to his more than 73 million followers.

The messages falsely claimed that India would be adopting Bitcoin as its official currency and that the Indian government had bought 500 Bitcoin tokens and would distribute them across the country. 

The false statements included a link to a malicious website designed to appear as though it was part of the Bitcoin giveaway promotion. Shortly after the illegitimate tweet was posted, it was deleted from the account. The fake tweets were entirely contrary to previous statements made by the Indian government will refuse to recognise   Bitcoin as a currency in the country. 

After the attack, the Office of the Prime Minister of India issued a tweet of its own informing the public that the tweets were false and to disregard any communications shared by the perpetrators. 

A Twitter spokesperson told the Wall Street Journal that it had secured Modi’s account “as soon as we became aware of this activity.” Twitter said no other accounts were compromised in the incident. Twitter said that it had secured Modi’s account once it became aware of the unauthorized activity. No other accounts were compromised in the incident. 

The identities of the hackers are currently unknown. An investigation into the Twitter hack has been launched by the police in India. 

Twitter hackers targeting accounts of prominent individuals isn’t something new. In fact, there have been several high-profile cases of social media accounts like Twitter of celebrities, politicians, and sports personalities that have been breached over the years. While celebrities who’ve had their social media pieces hacked did not have such a huge impact on their followers, it’s a different and more serious issue when politicians get their accounts hacked. 

It is not the first time that senior government Twitter accounts has been compromised. Last year, the Indian Prime Minister’s relief fund was taken over and a series of fake tweets were sent out seeking donations to an account belonging to the hackers. Followers were asked in a series of tweets to donate to India’s National Relief Fund through crypto currency.

In in July 2020, US presidential candidate Joe Biden, former US President Barack Obama and Tesla CEO Elon Musk had their accounts taken over and used to solicit digital currency and a number of tech billionaires including Amazon CEO Jeff Bezos and Microsoft co-founder Bill Gates. Celebrities Kanye West and his wife, Kim Kardashian West, were also hacked.

India is in the process of formulating  a national Cyber Crisis Management Plan to countering cyber attacks and extortion for implementation by all ministries and departments.

Times of India:    Techwire Asia:    Oodaloop:     Infosecurity Magazine:     WSJ:     

Al Jazeera:     JIOForme:    NCSN:

You Might Also Read: 

Financial Fraud Using Fake Celebrity Endorsements:

 

« Penetration Testing & Ethical Hackers
Toolbox For Outlook Password Is Unrivaled »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

National Agency for the Security of Information Systems (ANSSI) - France

National Agency for the Security of Information Systems (ANSSI) - France

The role of Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI) is to foster a coordinated, ambitious, pro-active response to cybersecurity issues in France.

Redbud

Redbud

Redbud is a specialist search and recruitment firm for Information Security professionals.

totemo

totemo

Totemo offers solutions for the secure exchange of business information.

Digiserve

Digiserve

Digiserve by Telkom Indonesia is an end-to-end managed solutions provider committed to empowering enterprises in Indonesia.

Information & eGovernment Authority (iGA) - Bahrain

Information & eGovernment Authority (iGA) - Bahrain

The Information & eGovernment Authority facilitates many services catering to different parts of the community within the IT sector in Bahrain including information security.

Multitel

Multitel

Multitel is an independent research centre. We develop and integrate emerging technologies into the industrial fabric at the regional and international levels.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions creates enterprise mobility and file sharing solutions for companies, teams and freelancers.

Snode Technologies

Snode Technologies

Snode's Guardian cybersecurity platform uses AI and machine learning to monitor, detect and proactively respond to all threats on every device within your network.

Cloud Box Technologies

Cloud Box Technologies

Cloud Box Technologies is one of the premier IT Infrastructure Solution providers in the Middle East.

Enso Security

Enso Security

Enso is the first Application Security Posture Management (ASPM) solution, helping security teams everywhere eliminate their AppSec chaos with application discovery, classification and management.

Foretrace

Foretrace

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors.

Onesecure Asia

Onesecure Asia

ONESECURE Asia’s expertise and services are built around its mission to provide reliable, robust and scalable technology solutions to cater for its customers’ needs.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.