Hackers Compromise Indian Prime Minister's Twitter Account

The personal Twitter account of India's Prime Minister Narendra Modi has been compromised  and  government officials are urgently investigating how his account was hacked. 

Attackers were able to hack into the social media account on December 11 and tweeted messages to his more than 73 million followers.

The messages falsely claimed that India would be adopting Bitcoin as its official currency and that the Indian government had bought 500 Bitcoin tokens and would distribute them across the country. 

The false statements included a link to a malicious website designed to appear as though it was part of the Bitcoin giveaway promotion. Shortly after the illegitimate tweet was posted, it was deleted from the account. The fake tweets were entirely contrary to previous statements made by the Indian government will refuse to recognise   Bitcoin as a currency in the country. 

After the attack, the Office of the Prime Minister of India issued a tweet of its own informing the public that the tweets were false and to disregard any communications shared by the perpetrators. 

A Twitter spokesperson told the Wall Street Journal that it had secured Modi’s account “as soon as we became aware of this activity.” Twitter said no other accounts were compromised in the incident. Twitter said that it had secured Modi’s account once it became aware of the unauthorized activity. No other accounts were compromised in the incident. 

The identities of the hackers are currently unknown. An investigation into the Twitter hack has been launched by the police in India. 

Twitter hackers targeting accounts of prominent individuals isn’t something new. In fact, there have been several high-profile cases of social media accounts like Twitter of celebrities, politicians, and sports personalities that have been breached over the years. While celebrities who’ve had their social media pieces hacked did not have such a huge impact on their followers, it’s a different and more serious issue when politicians get their accounts hacked. 

It is not the first time that senior government Twitter accounts has been compromised. Last year, the Indian Prime Minister’s relief fund was taken over and a series of fake tweets were sent out seeking donations to an account belonging to the hackers. Followers were asked in a series of tweets to donate to India’s National Relief Fund through crypto currency.

In in July 2020, US presidential candidate Joe Biden, former US President Barack Obama and Tesla CEO Elon Musk had their accounts taken over and used to solicit digital currency and a number of tech billionaires including Amazon CEO Jeff Bezos and Microsoft co-founder Bill Gates. Celebrities Kanye West and his wife, Kim Kardashian West, were also hacked.

India is in the process of formulating  a national Cyber Crisis Management Plan to countering cyber attacks and extortion for implementation by all ministries and departments.

Times of India:    Techwire Asia:    Oodaloop:     Infosecurity Magazine:     WSJ:     

Al Jazeera:     JIOForme:    NCSN:

You Might Also Read: 

Financial Fraud Using Fake Celebrity Endorsements:

 

« Penetration Testing & Ethical Hackers
Toolbox For Outlook Password Is Unrivaled »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

SecDev

SecDev

SecDev is a consulting firm working at the intersection of geopolitical, digital, urban, energy and cyber risk.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

DirectDefense

DirectDefense

DirectDefense is an information security services and managed services provider.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Cynerio

Cynerio

Cynerio develops cybersecurity protections for medical devices, comparing network behavior with a database of medical workflows.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Infopulse

Infopulse

Infopulse is a global provider of Software Engineering, Cloud & IT Infrastructure Management, and Cybersecurity services.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

PhishProtection

PhishProtection

We created Phish Protection to prevent all types of phishing including spear phishing protection and office 365 email protection for your small business.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.