Twitter Breach : Massive Cyber Attack Of 2020

by | Dec 11, 2022

One more hack and this one is the biggest social media cyberattack with 130 accounts hacked but unfortunately, this is not the first time when Twitter got hacked. In 2017, an employee deleted President Donald Trump’s account on his last day of work. Last year hackers were successful in hijacking the account of Jack Dorsey Twitter CEO. By the SIM swap attack on AT&T, a mobile provider of the phone number tied to Jack Dorsey’s account.  

It all started after a tweet requesting donations in cryptocurrency from the official accounts of Apple & Uber followed by Tesla  CEO – Elon Musk and Microsoft co-founder Bill Gates then hackers took over accounts of Barak Obama, Biden, Mike Bloomberg, Amazon CEO – Jeff Bezos, Floyd Mayweather,  entertainers Kanye West and wife Kim Kardashian and many more well-known personalities. 

Twitter also revealed that hackers have downloaded personal information including private messages, email accounts, address books,  images & videos attached to private messages of up to 8 individuals.

The tweet noted “All Bitcoin sent to the address below will be sent back double! If you spend $1000, I will send back $2000. Only doing this for 30 minutes. [the link]. Enjoy!”

What is the impact of the Twitter hack?

It could be one of the most expensive tweets in history. 

This time the hack of high-profile public figures, executives, and celebrities’ Twitter accounts raised so many questions about cybersecurity. Hackers started tweeting out links to bitcoins scams. It was reported that in just 24 hours’ time bitcoin wallet got a value of $120,000 through 518 transactions by Chain analysis, a research company that tracks the movement of cryptocurrencies.

The stock market value of Twitter has gone down. This is not only financial loss but reputation loss also. And the followers lost their money by falling into this trap.

Is it just a smokescreen of a big incident or is it over? We will come to know as time goes by.

But we need to understand the reasons behind it. For now, there are no details on how this happens.

What could be possible ways to hack Twitter?

Hackers got access to an internal Twitter administrative tool for one or all of the reasons mentioned below:

  • Hackers tricked an employee with a spear-phishing scam & steal the password of Twitter’s system administrators.
  • Someone coerced an employee to provide access.
  • Coordinated social engineering attacks on some employees having access to administrative tools.
  • By bribing employees.
  • Hackers might exploit a vulnerability in a particular operating system and might have got access to every computer that runs on that system’s software.
  • Not having strong Privileged Access Management Solutions, otherwise, should raise the flag if there is any change in the popular Twitter accounts.

After getting access to the Twitter administrative tool then they might have hacked these 130 popular Twitter accounts with Sim Swapping.

What is Sim Swapping?

Sim Swapping: Attackers can change the email address of the attached account and disable multi-factor authentication. Hackers trick the mobile network into transferring your number to a sim card in the hacker’s possession – including the one-time security code required to access personal accounts.

It can go worst if the hackers go on disrupting an election, taking control of the stock market, and attempting to start a war by issuing false statements from the world leader’s accounts.

Actions taken by Twitter

Twitter locked all the affected accounts and removed posts by the attackers. And acknowledged the incident and announced, “it’s a coordinated social engineering attack” and working on it to fix it.

Could the attack be prevented?

Maybe yes. This incident has highlighted that all major social media platforms such as Facebook, Twitter, and youtube, cross-check their security measures & administrative access and role. This signals that whatever we do online, even our private chats are at risk without a proper security and administrative controls. Though it is not sure the reason behind this attack but it highlights the weakest link in the cybersecurity chain is “User” or “Human error”. Maybe this hack will serve as a wake-up call.

No matter how many cybersecurity control measures are there in the infrastructure, companies must provide proper security awareness training. Due to Covid19,  work from home has become the new normal, and companies and their employees are on the radar of cybercriminals.

How Bitsys Tecnologies can help you?

Bitsys Technologies can help you in adopting cybersecurity measures to mitigate cyber risks and make your system robust to combat the prevailing cyber threats.

Bitsys Technologies’ cybersecurity assessment can help in understanding, managing, controlling, and mitigating cyber threats across your organizations. The major purpose of a cyber risk assessment is to guide the decision-maker and support proper risk responses.

The only way to protect what you’ve worked hard to build is to be vigilant when it comes to cybersecurity. If you’d like to know more about how your business can benefit from managed services, just give us a call, we are here to help.

Twitter revealed that hackers have downloaded personal information including private messages, email accounts, images & videos to private messages

How to get Microsoft Defender Health on Mac Fleet

Managing Macs for multiple companies gives us the opportunity to work in various environment and detect issues where it occurs first & then implement a solution for all others at the same time. Recently there was a requirement to find if there are MDD instances...

Implementing Machine Learning in IT Support Setup

Machine learning has the potential to revolutionize the way IT support businesses operate. This cutting-edge technology can be applied in a number of ways to improve the efficiency, accuracy, and speed of IT support services. Here are some ways that machine learning...

Benefits of Apple Business Managers

Apple Business Manager is a web-based platform designed to streamline the process of purchasing, deploying, and managing Apple devices within a business organization. It allows IT administrators to manage and distribute Apple devices and apps to their employees,...

Adoption of Macs in Enterprise: A Growing Trend

This image belongs to Kandji.io In recent years, there has been a growing trend of enterprises adopting Macs as their primary desktop and laptop computers. This shift in technology can be attributed to several factors, including...

ESG as future of IT

ESG, or environmental, social, and governance, is becoming increasingly important in the field of IT. As technology continues to advance and play a larger role in our daily lives, companies are being held to higher standards in terms of their impact on the environment...

Secure Your Mac with FileVault

FileVault is a built-in encryption tool for Macs that helps protect your data from unauthorized access by encrypting your hard drive. Enabling FileVault is a simple process that only takes a few minutes, and it can give you peace of mind knowing that your data is safe...

Is outsourcing IT to India is better or keeping it inhouse?

There are pros and cons to both outsourcing IT services to India and keeping IT within the company. Ultimately, the decision to outsource or keep IT in-house will depend on the specific needs and goals of the company, as well as the resources and capabilities...

How to be a good SCRUM Master

In an Agile development team, the Scrum Master is a crucial role that helps the team to work effectively and efficiently. A Scrum Master is responsible for facilitating the team's use of the Scrum framework and ensuring that the team is able to deliver high-quality...

Basics of Enterprise Patch Management

Enterprise patch management is the process of ensuring that all the software and applications within an organization are kept up-to-date with the latest patches and updates. This is important because software and applications are constantly being improved and updated...

Cost saving for enterprises by choosing M1 Macs

The M1 Mac has had a significant impact on the enterprise market since its release. As a highly-efficient and powerful machine, the M1 Mac has proven to be a valuable asset to businesses in a variety of industries. One of the key benefits of the M1 Mac is its improved...

CRM Is A Process, Not A Product! How Can We Make CRM A Successful Tool?

CRM (Customer Relationship Management) is software that allows businesses to manage business relationships and information associated with them. It provides a platform that manages interactions with customers, stores information about them, and automates processes...

WE OFFER

Digital Workplace Services

MAC SUPPORT
Automated Tasks

DIGITAL WORKPLACE
 Office IT Support

MODERN WORKPLACE
Intune for Win & Mac

VIRTUAL DESKTOPS
Citrix Virtual Apps

MODERN WORKPLACE
Mac Win iOS Android

ONSITE TECHIES
Mac & Win Trained