The Twitter Hackers Stole Direct Message History From 8 Accounts

A smudged Twitter logo surrounded by binary code.DANIEL CONSTANTE / Shutterstock

the Saga of the Giant Twitter Hack keep on going. Twitter posted its first blog post on the subject over the weekend and gave us a more detailed look at what happened when hackers broke into the company’s internal systems. This includes targeting 130 accounts and stealing data from 8 of those users.

In case you missed it, recently hackers broke into Twitter’s internal tools that give the company access to user accounts. Hackers attempted to take over 130 accounts, and in this latest update, Twitter admitted she was successful in 45 cases.

Victims include Bill Gates, Barack Obama, Jeff Bezos, Elon Musk, Uber and Apple official Twitter accounts, and more. Once the hackers gained access, they tweeted a Bitcoin scam, offering to double the money for anyone who sent Bitcoin to a wallet. It wasn’t true, of course.

Last weekend’s security update gives us a better idea of ​​what happened. Twitter said the hackers broke into company systems through employees using social engineering techniques. According to the company:

The attackers managed to manipulate a small number of employees and use their credentials to gain access to Twitter’s internal systems, including to gain access to our two-factor protections.

While the Bitcoin scam was an obvious result, Twitter found that the hackers had taken a new step with eight users. The hackers downloaded the account data using the company’s “Your Twitter Data” tool, available for user accounts. It’s a treasure trove of information, including direct message history.

Twitter does not say which eight accounts had their data stolen, but clarified that none of the users in question are verified. That’s not to say the account itself is small, as many users with thousands of subscribers, like our own Chris Hoffman, still lack verification.

As Twitter updates us with more information, we’ll be here to get you all the details.

Source: Twitter

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.