McDonald's blames anti-Trump tirade on "hacked" Twitter

Security experts warn against unsecured social media after "hacked" twitter account blasts Trump's "tiny hands"

McDonald's has blamed a vehemently anti-Trump tweet on hackers, after the company's official account blasted him as "a disgusting excuse of a President".

McDonald's has publicly apologised for the tweet, stating that the account was compromised. "Based on our investigation, we have determined that our Twitter account was hacked by an external source," a statement read. "We took swift action to secure it, and we apologise this tweet was sent through our corporate McDonald's account."

Although it was swiftly deleted, Donald Trump's personal Twitter account was tagged in the offending post, which was sent out to over 150,000 followers.

The tweet also expressed a desire for the return of former president Obama, and pointed out that Trump has "tiny hands".

Advertisement
Advertisement - Article continues below

Unsurprisingly, many Twitter users have reacted with hilarity at a global fast food brand getting into an apparent Twitter spat with the president of the United States.

Others, however, have called it a conspiracy, claiming that the stunt was orchestrated by Obama's former press secretary and calling for a boycott of the restaurant chain.

Security experts have warned that this should be a wakeup call for companies that aren't properly securing their social media accounts.

"Companies using Twitter in recent years have gotten much better about using group management software with 2FA/MFA options," said F-Secure security advisor Sean Sullivan. "But still, there's the possibility that an employee with access can be compromised."

"McDonalds and other companies can enforce multifactor authentication to limit damage via phishing, but if an employee's device is hacked? Well, then the hacker has access to whatever is logged on at the time."

Image credit: Bigstock

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/policy-legislation/34515/what-has-donald-trump-done-for-the-tech-industry-so-far
Policy & legislation

What has Donald Trump done for the tech industry so far?

27 Sep 2019
Visit/cyber-warfare/33958/are-we-in-the-midst-of-a-cyber-war
cyber warfare

Are we in the midst of a cyber war?

4 Jul 2019
Visit/analytics/30201/how-to-use-twitter-analytics-start-sharing-like-the-pros
analytics

How to use Twitter analytics: start sharing like the pros

21 Feb 2019

Most Popular

Visit/business-strategy/digital-transformation/354201/boston-dynamics-dog-like-robots-sniff-out-bombs-for
digital transformation

Boston Dynamics dog-like robots sniff out bombs for Massachusetts police

26 Nov 2019
Visit/business-strategy/mergers-and-acquisitions/354191/xerox-threatens-hostile-takeover-after-hp-rebuffs
mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019