Hackers Compromise Indian Prime Minister's Twitter Account

The personal Twitter account of India's Prime Minister Narendra Modi has been compromised  and  government officials are urgently investigating how his account was hacked. 

Attackers were able to hack into the social media account on December 11 and tweeted messages to his more than 73 million followers.

The messages falsely claimed that India would be adopting Bitcoin as its official currency and that the Indian government had bought 500 Bitcoin tokens and would distribute them across the country. 

The false statements included a link to a malicious website designed to appear as though it was part of the Bitcoin giveaway promotion. Shortly after the illegitimate tweet was posted, it was deleted from the account. The fake tweets were entirely contrary to previous statements made by the Indian government will refuse to recognise   Bitcoin as a currency in the country. 

After the attack, the Office of the Prime Minister of India issued a tweet of its own informing the public that the tweets were false and to disregard any communications shared by the perpetrators. 

A Twitter spokesperson told the Wall Street Journal that it had secured Modi’s account “as soon as we became aware of this activity.” Twitter said no other accounts were compromised in the incident. Twitter said that it had secured Modi’s account once it became aware of the unauthorized activity. No other accounts were compromised in the incident. 

The identities of the hackers are currently unknown. An investigation into the Twitter hack has been launched by the police in India. 

Twitter hackers targeting accounts of prominent individuals isn’t something new. In fact, there have been several high-profile cases of social media accounts like Twitter of celebrities, politicians, and sports personalities that have been breached over the years. While celebrities who’ve had their social media pieces hacked did not have such a huge impact on their followers, it’s a different and more serious issue when politicians get their accounts hacked. 

It is not the first time that senior government Twitter accounts has been compromised. Last year, the Indian Prime Minister’s relief fund was taken over and a series of fake tweets were sent out seeking donations to an account belonging to the hackers. Followers were asked in a series of tweets to donate to India’s National Relief Fund through crypto currency.

In in July 2020, US presidential candidate Joe Biden, former US President Barack Obama and Tesla CEO Elon Musk had their accounts taken over and used to solicit digital currency and a number of tech billionaires including Amazon CEO Jeff Bezos and Microsoft co-founder Bill Gates. Celebrities Kanye West and his wife, Kim Kardashian West, were also hacked.

India is in the process of formulating  a national Cyber Crisis Management Plan to countering cyber attacks and extortion for implementation by all ministries and departments.

Times of India:    Techwire Asia:    Oodaloop:     Infosecurity Magazine:     WSJ:     

Al Jazeera:     JIOForme:    NCSN:

You Might Also Read: 

Financial Fraud Using Fake Celebrity Endorsements:

 

« Penetration Testing & Ethical Hackers
Toolbox For Outlook Password Is Unrivaled »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

European Defence Agency (EDA)

European Defence Agency (EDA)

EDAs mission is to improve European defence capabilities. Programme areas include Cyber Defence.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

AuthenTrend

AuthenTrend

AuthenTrend provide biometric authentication products to achieve high security with extreme ease-of-use for the user.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

CyberSec Hub

CyberSec Hub

The goal of CyberSec Hub is to create a centre of excellence for cybersecurity in Krakow, a new European “Cyber-Silicon Valley”.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

Blue Lance

Blue Lance

Blue Lance is a global provider of cybersecurity governance solutions. Our software solutions automatically collect and store the information necessary for investigations, audit and compliance.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Microminder Cyber Security

Microminder Cyber Security

Microminder Cyber Security are innovators, advisors, strategists committed to solving your cyber security challenges.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).