Twitter’s tech systems breached by hacker

A very serious breach of security for the popular social network, as an intruder breaks into its systems and potentially has access to everybody’s Twitter account.

Someone has managed to hack into Twitter's private technical systems, resulting in the accounts of several high-profile individuals being compromised and defaced, including Barack Obama and Britney Spears.

Twitter discovered that 33 accounts had been hacked using tools that the Twitter support team uses, which helps people with tasks such as editing the email address associated with their Twitter account when they forget it.

This is different to the phishing attacks which affected a number of users (including Stephen Fry) at the weekend, because rather than taking over accounts using phished usernames and passwords, this was an attack on Twitter's own systems.

It is still unclear whether this was the work of an external hacker or a Twitter employee. This attack was much more serious than the phishing scam, as the internal hack exposed everybody's Twitter account to hacking or defacement.

On the Twitter blog co-founder Biz Stone said: "We considered this a very serious breach of security and immediately took the support tools offline. We'll put them back only when they're safe and secure."

Twitter planned to release a closed beta of the open authentication protocol OAuth this month, which would allow secure API (Application Programming Interface) authorisation.

However, Twitter said that it was important to note that OAuth would not have prevented a phishing scam, nor would it have prevented accounts from being compromised. Instead OAuth is for those who use third party applications built on the Twitter API to access their data while protecting their account credentials.

The security breach and phishing attacks come at a bad time, with Twitter potentially being the next break-out social network. Late last year talks with Facebook about a potential takeover deal fell through.

Featured Resources

Next-generation time series: Forecasting for the real world, not the ideal world

Solve time series problems with AI

Free download

The future of productivity

Driving your business forward with Microsoft Office 365

Free download

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation

Free download

A quantitative comparison of UPS monitoring and servicing approaches across edge environments

Effective UPS fleet management

Free download

Recommended

Twitter sells mobile ad unit for triple its original value
Acquisition

Twitter sells mobile ad unit for triple its original value

7 Oct 2021
Twitter, LinkedIn reverse course due to climbing COVID cases
remote access

Twitter, LinkedIn reverse course due to climbing COVID cases

29 Jul 2021
Social media companies vow to reduce abuse of women online
Security

Social media companies vow to reduce abuse of women online

1 Jul 2021
Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Royal Mint to recover gold from smartphones and laptops in world first
Technology

Royal Mint to recover gold from smartphones and laptops in world first

21 Oct 2021