McDonald's blames anti-Trump tirade on "hacked" Twitter
Security experts warn against unsecured social media after "hacked" twitter account blasts Trump's "tiny hands"
McDonald's has blamed a vehemently anti-Trump tweet on hackers, after the company's official account blasted him as "a disgusting excuse of a President".
McDonald's has publicly apologised for the tweet, stating that the account was compromised. "Based on our investigation, we have determined that our Twitter account was hacked by an external source," a statement read. "We took swift action to secure it, and we apologise this tweet was sent through our corporate McDonald's account."
Although it was swiftly deleted, Donald Trump's personal Twitter account was tagged in the offending post, which was sent out to over 150,000 followers.
The tweet also expressed a desire for the return of former president Obama, and pointed out that Trump has "tiny hands".
Unsurprisingly, many Twitter users have reacted with hilarity at a global fast food brand getting into an apparent Twitter spat with the president of the United States.
Others, however, have called it a conspiracy, claiming that the stunt was orchestrated by Obama's former press secretary and calling for a boycott of the restaurant chain.
Security experts have warned that this should be a wakeup call for companies that aren't properly securing their social media accounts.
"Companies using Twitter in recent years have gotten much better about using group management software with 2FA/MFA options," said F-Secure security advisor Sean Sullivan. "But still, there's the possibility that an employee with access can be compromised."
"McDonalds and other companies can enforce multifactor authentication to limit damage via phishing, but if an employee's device is hacked? Well, then the hacker has access to whatever is logged on at the time."
Image credit: Bigstock
The essential guide to cloud-based backup and disaster recovery
Support business continuity by building a holistic emergency planDownload now
Trends in modern data protection
A comprehensive view of the data protection landscapeDownload now
How do vulnerabilities get into software?
90% of security incidents result from exploits against defects in softwareDownload now
Delivering the future of work - now
The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.Download now