Security News

News Wrap: Twitter Hack, Apple Under Fire and Global Privacy Finger Wags
2020-07-24 16:28

Threatpost editors talk about the biggest security news stories for the week ended Jul. 24.

Twitter Says Hackers Accessed Dutch Politician's Inbox
2020-07-24 15:04

Twitter says an elected Dutch official was among 36 account holders whose direct message inboxes were accessed in a recent high-profile hack. The politician, anti-Islam lawmaker Geert Wilders, said Thursday that he was informed by Twitter that his account was compromised by a hacker, who posted tweets on his account and sent false direct messages, or DMs, in his name.

Twitter hack latest: Up to 36 compromised accounts had their private messages read – including a Dutch politician's
2020-07-23 13:42

Twitter has admitted that the naughty folk who hijacked verified accounts last week read a portion of hacked users' direct messages. Among the 36 Twitter users whose direct messages, email addresses and phone numbers were definitely accessed by account hijackers last week was one Dutch politician, the microblogging platform said overnight.

Twitter: Hackers Accessed Private Messages for Elite Accounts
2020-07-23 12:57

Hackers accessed direct messages for 36 of the 130 high-profile users whose accounts were hacked in an unprecedented account breach last week, Twitter confirmed Wednesday. The company also tweeted a clarification to differentiate between a previous update to the hack in which they said hackers downloaded an archive of "Your Twitter Data" from eight of the 130 accounts, adding that none of these were verified accounts.

Twitter Says Hackers Accessed DM Inboxes in Recent Attack
2020-07-23 11:44

Twitter on Wednesday revealed that attackers accessed the direct message inboxes of some of the accounts that were compromised in last week's security incident. The attack took place on July 15 and involved the abuse of internal Twitter systems and tools to gain access to high-profile accounts such as those of Jeff Bezos, Mike Bloomberg, Bill Gates, or Elon Musk, and post fake messages promoting a crypto-currency scam.

Twitter Hacking for Profit and the LoLs
2020-07-22 20:25

New information suggests that at least two of them operated a service that resold access to Twitter employees for the purposes of modifying or seizing control of prized Twitter profiles. SWIMPING. My July 15 story observed there were strong indications that the people involved in the Twitter hack have connections to SIM swapping, an increasingly rampant form of crime that involves bribing, hacking or coercing employees at mobile phone and social media companies into providing access to a target's account.

On the Twitter Hack
2020-07-20 13:49

Not a few people's Twitter accounts, but all of Twitter. Someone compromised the entire Twitter network, probably by stealing the log-in credentials of one of Twitter's system administrators.

Hackers Accessed, Downloaded Twitter User Data in Recent Attack
2020-07-20 10:28

Social media platform Twitter has confirmed that attackers downloaded user data from some of the accounts compromised in last week's security incident. In a blog post published over the weekend, Twitter revealed that the attackers launched a password reset operation for 45 of the 130 targeted user accounts, which allowed them to seize control of the accounts and post tweets.

Twitter hackers busted 2FA to access accounts and then reset user passwords
2020-07-20 06:25

Twitter has revealed more about the July 15 attack that saw several prominent accounts hijacked to promote a Bitcoin scam. The Saturday, July 18 update admits "The attackers successfully manipulated a small number of employees and used their credentials to access Twitter's internal systems, including getting through our two-factor protections."

Week in review: Counterfeit Cisco switches, hijacked Twitter accounts, vulnerable SAP applications
2020-07-19 09:00

Critical flaw gives attackers control of vulnerable SAP business applicationsSAP has issued patches to fix a critical vulnerability that can lead to total compromise of vulnerable SAP installations by a remote, unauthenticated attacker. Investigation highlights the dangers of using counterfeit Cisco switchesAn investigation, which concluded that counterfeit network switches were designed to bypass processes that authenticate system components, illustrates the security challenges posed by counterfeit hardware.