High Profile Twitter Users Hacked

Hackers pumping a crypto giveaway scam appear to have compromised the Twitter accounts of leading crypto currency exchanges and prominent individuals. The targeted victims found their Twitter accounts had been hacked  in one of the most widespread attacks on the platform has ever seen.

The hackers took over the victims' accounts in an attempt to promote a bitcoin scam that would appear to be earning its creators a lot of money.

Twitter has confirmed it took the drastic step of blocking new tweets from every verified user, compromised or no, as well as locking all compromised accounts. Hacked accounts included President Barack Obama, Joe Biden, Elon Musk, Bill Gates, Kanye West, Michael Bloomberg and Apple Corp.

A first wave of attacks hit the Twitter accounts of prominent crypto currency leaders and companies. But the list of victims quickly broadened to include a Who’s Who of Americans in politics, entertainment and tech, in a major show of force by the hackers. Twitter Support tweeted that the posts soliciting crypto currency payments were part of a "coordinated social engineering attack" that successfully targeted Twitter employees with access to internal systems and tools.

Twitter quickly removed many of the messages, but in some cases similar tweets were sent again from the same accounts, suggesting that Twitter was powerless to regain control.

The scam has attracted the attention of the FBI who issued a statement saying "We are aware of today's security incident involving several Twitter accounts belonging to high profile individuals...The accounts appear to have been compromised in order to perpetrate crypto currency fraud. We advise the public not to fall victim to this scam by sending crypto currency or money in relation to this incident."

Twitter said that it immediately locked down the affected accounts and removed the tweets posted by the attackers while taking further action to prevent other verified accounts that had not shown evidence of being compromised from tweeting or changing their passwords.  

Twitter:       Coin Desk:       UPI:      CNN:        New York Times:      Snopes:       The Verge

You Might Also Read:

Hackers Are Selling Your Social Media Data

 

« Huawei 5G Ordered Out Of UK Networks
Confirmed: US Cyber Attack On Russia In 2018 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Cyxtera Technologies

Cyxtera Technologies

Cyxtera offers powerful, secure IT infrastructure capabilities paired with agile, dynamic software-defined security.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

NexGenT

NexGenT

NexGenT have combined military-style training with decades of network engineering and cyber security experience into an immersive program to get people into cyber security fast and effectively.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

SEK Security Ecosystem Knowledge

SEK Security Ecosystem Knowledge

SEK helps companies in the complex path of cybersecurity; in the analysis, detection and prevention of digital threats.

Cyber News Live

Cyber News Live

Welcome to Cyber News Live (CNL), we are dedicated to keeping everyone safe online. We provide vital information.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

Deepware

Deepware

Deepware is an emerging AI research company dedicated to exploring the potential of GenAI in both generation and detection.