Twitter’s tech systems breached by hacker

A very serious breach of security for the popular social network, as an intruder breaks into its systems and potentially has access to everybody’s Twitter account.

Someone has managed to hack into Twitter's private technical systems, resulting in the accounts of several high-profile individuals being compromised and defaced, including Barack Obama and Britney Spears.

Twitter discovered that 33 accounts had been hacked using tools that the Twitter support team uses, which helps people with tasks such as editing the email address associated with their Twitter account when they forget it.

Advertisement - Article continues below

This is different to the phishing attacks which affected a number of users (including Stephen Fry) at the weekend, because rather than taking over accounts using phished usernames and passwords, this was an attack on Twitter's own systems.

It is still unclear whether this was the work of an external hacker or a Twitter employee. This attack was much more serious than the phishing scam, as the internal hack exposed everybody's Twitter account to hacking or defacement.

On the Twitter blog co-founder Biz Stone said: "We considered this a very serious breach of security and immediately took the support tools offline. We'll put them back only when they're safe and secure."

Twitter planned to release a closed beta of the open authentication protocol OAuth this month, which would allow secure API (Application Programming Interface) authorisation.

Advertisement
Advertisement - Article continues below

However, Twitter said that it was important to note that OAuth would not have prevented a phishing scam, nor would it have prevented accounts from being compromised. Instead OAuth is for those who use third party applications built on the Twitter API to access their data while protecting their account credentials.

The security breach and phishing attacks come at a bad time, with Twitter potentially being the next break-out social network. Late last year talks with Facebook about a potential takeover deal fell through.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/security/355013/10-quick-tips-to-identifying-phishing-emails
Security

10 quick tips to identifying phishing emails

16 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

9 Mar 2020
Visit/marketing-comms/social-media/354837/twitter-bans-70-pro-bloomberg-accounts
social media

Twitter bans 70 pro-Bloomberg accounts

23 Feb 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Most Popular

Visit/mobile/mobile-phones/355088/apple-lifts-iphone-purchase-restrictions
Mobile Phones

Apple lifts iPhone purchase restrictions

23 Mar 2020
Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/operating-systems/microsoft-windows/355105/microsoft-puts-windows-development-on-lockdown
Microsoft Windows

Microsoft puts Windows development on lockdown

25 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020