Hackers take over Google CEO Sundar Pichai’s social media

OurMine broke into Pichai’s Quora account, which was linked to his Twitter profile

Hackers who broke into Google CEO Sundar Pichai's Quora account managed to post onto his Twitter profile.

A team of hackers called OurMine claimed responsibility for the hack on Pichai, whose Twitter account was linked to Q&A site Quora, enabling the hackers to post messages on Quora that were then copied over to Pichai's Twitter page.

Advertisement - Article continues below

Pichai has since deleted the messages, but they can be viewed on The Next Web.

It led to posts like #OurMine We are just testing your security!?' and Is it possible to force my android app users of all version to update the app?'

Pichai's Twitter page no longer features the hackers' messages

Pichai has since deleted the posts, but it comes after OurMine which offers a range of security services including social media accounts protection also hacked Facebook CEO Mark Zuckerberg's accounts, as well as Spotify CEO Daniel Ek's.

Zuckerberg's Twitter, LinkedIn and Pinterest accounts fell to the hackers, supposedly a three-person team and again posted messages boasting of their success.

OurMine claimed it was able to hack into the accounts after millions of people's LinkedIn passwords were made available during a hack in 2012. LinkedIn advised members to change their passwords, but many used the same password for other social media sites.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The team's apparent aim is to promote better security and raise awareness of its own services that offer to do this for people.

This is the latest situation calling into question CEOs' security habits, after last week Zuckerberg inadvertently revealed he tapes over his laptop webcam and mic in a photo promoting Instagram.

IT Pro has contacted OurMine asking why it is hacking people's accounts, and whether it is relying on old passwords to do so.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/ethical-hacking/356252/poorly-secured-banking-apps-lead-to-cyber-threats
ethical hacking

Mobile banking apps are exposing user data to attackers

26 Jun 2020
Visit/security/malware/356231/most-malware-came-through-https-connections-in-q1-2020
malware

Most malware came through HTTPS connections in Q1 2020

25 Jun 2020
Visit/security/phishing/356211/phishing-attacks-target-unsuspecting-wells-fargo-customers
phishing

Phishing attacks target unsuspecting Wells Fargo customers

24 Jun 2020
Visit/security/hacking/356210/trump-administration-wants-to-enhance-the-security-of-gov-sites
hacking

Trump administration wants to enhance the security of .gov sites

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/security/vulnerability/356295/microsoft-patches-high-risk-flaws-that-can-be-exploited-with-a
vulnerability

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020
Visit/policy-legislation/data-protection/356344/eu-institutions-warned-against-purchasing-any-further
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020