Twitter’s tech systems breached by hacker

A very serious breach of security for the popular social network, as an intruder breaks into its systems and potentially has access to everybody’s Twitter account.

Someone has managed to hack into Twitter's private technical systems, resulting in the accounts of several high-profile individuals being compromised and defaced, including Barack Obama and Britney Spears.

Twitter discovered that 33 accounts had been hacked using tools that the Twitter support team uses, which helps people with tasks such as editing the email address associated with their Twitter account when they forget it.

This is different to the phishing attacks which affected a number of users (including Stephen Fry) at the weekend, because rather than taking over accounts using phished usernames and passwords, this was an attack on Twitter's own systems.

It is still unclear whether this was the work of an external hacker or a Twitter employee. This attack was much more serious than the phishing scam, as the internal hack exposed everybody's Twitter account to hacking or defacement.

On the Twitter blog co-founder Biz Stone said: "We considered this a very serious breach of security and immediately took the support tools offline. We'll put them back only when they're safe and secure."

Twitter planned to release a closed beta of the open authentication protocol OAuth this month, which would allow secure API (Application Programming Interface) authorisation.

However, Twitter said that it was important to note that OAuth would not have prevented a phishing scam, nor would it have prevented accounts from being compromised. Instead OAuth is for those who use third party applications built on the Twitter API to access their data while protecting their account credentials.

The security breach and phishing attacks come at a bad time, with Twitter potentially being the next break-out social network. Late last year talks with Facebook about a potential takeover deal fell through.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

FBI warns of ongoing corporate vishing attacks
phishing

FBI warns of ongoing corporate vishing attacks

19 Jan 2021
How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

15 Jan 2021
Hackers using COVID vaccine as a lure to spread malware
hacking

Hackers using COVID vaccine as a lure to spread malware

15 Jan 2021
Cyber criminals bypassing MFA to access cloud service accounts
two-factor authentication (2FA)

Cyber criminals bypassing MFA to access cloud service accounts

14 Jan 2021

Most Popular

IT retailer faces €10.4m GDPR fine for employee surveillance
General Data Protection Regulation (GDPR)

IT retailer faces €10.4m GDPR fine for employee surveillance

18 Jan 2021
Citrix buys Slack competitor Wrike in record $2.25bn deal
collaboration

Citrix buys Slack competitor Wrike in record $2.25bn deal

19 Jan 2021
Should IT departments call time on WhatsApp?
communications

Should IT departments call time on WhatsApp?

15 Jan 2021