The Twitter breach seems to be an insider job. A number of most popular accounts got a Bitcoin solicitation spam posted – such people as Bill Gates, Elon Musk, Barack Obama, Joe Biden, Jeff Bezos, Warren Buffett, Floyd Mayweather, Kim Kardashian and some other famous names published those tweets asking followers to dispatch bitcoin contribution. In total there were more than 100 accounts breached.
As the investigation is ongoing the new facts surface: the breach might have been instrumented from the inside, Twitter employee tools were misused affecting the company’s reputation. It was revealed that an employee was called on the phone which could lead to sharing access to Twitter tools with violators.
Some accounts even had the “Your Twitter Data” archives stolen. Twitter is now investigating into the matter and launching a profound security controls evaluation as well as online training for employees. The company has narrowed down staffers’ access to the system and Twitter tools, though stating that workers could only reset the passwords with special permission.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!