{"id":26681,"date":"2020-07-31T10:53:05","date_gmt":"2020-07-31T07:53:05","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=26681"},"modified":"2025-08-26T15:54:20","modified_gmt":"2025-08-26T12:54:20","slug":"twitter-reveals-new-details-of-the-hack","status":"publish","type":"post","link":"https:\/\/u1f987.com\/en\/twitter-reveals-new-details-of-the-hack\/","title":{"rendered":"Twitter reveals new details of the hack"},"content":{"rendered":"<p>The Twitter hackers behind the breach gained access to the social network&#8217;s internal tools through phishing aimed at employees&#8217; mobile phones. This is <a href=\"https:\/\/blog.twitter.com\/en_us\/topics\/company\/2020\/an-update-on-our-security-incident.html\" target=\"_blank\" rel=\"noopener noreferrer\">reported<\/a> in the company&#8217;s blog.<!--more--><\/p>\n<p>The attack affected a small number of employees. Using their credentials, the attackers managed to breach the company&#8217;s internal system and obtain additional information.<\/p>\n<p>Using this access, the hackers targeted other employees with access to the account-support tools. This allowed them to gain direct access to a number of accounts.<\/p>\n<p>The hackers attacked 130 accounts, but were able to send messages from only 45. Personal messages from 36 accounts were compromised, and from 7 accounts all information was exfiltrated.<\/p>\n<p>The company noted that access to tools for accessing user accounts is necessary to monitor platform rules. This access is held by a limited circle of employees.<\/p>\n<p>Twitter emphasised that the company continually monitors the propriety of using these tools. The platform&#8217;s management pledged to strengthen this oversight to prevent similar attacks in the future.<\/p>\n<p>On July 15, hackers compromised several Twitter accounts and posted messages about a fake Bitcoin giveaway.<\/p>\n<p>The company said that the attackers were able to seize the accounts through a social-engineering attack targeted at employees with access to internal systems.<\/p>\n<p>Subsequently, the platform said the attackers compromised 45 accounts of celebrities through password resets.<\/p>\n<p>Earlier, former employees of the network said that access to user accounts was held by many employees.<\/p>\n<p>Subscribe to ForkLog&#8217;s news on <a href=\"https:\/\/vk.com\/forklogcom\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">VK<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Twitter hackers behind the breach gained access to the social network&#8217;s internal tools through phishing aimed at employees&#8217; mobile phones. This is reported in the company&#8217;s blog.<\/p>\n","protected":false},"author":1,"featured_media":26682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,40],"class_list":["post-26681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-twitter"],"aioseo_notices":[],"amp_enabled":true,"views":"24","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/26681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/comments?post=26681"}],"version-history":[{"count":1,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/26681\/revisions"}],"predecessor-version":[{"id":26683,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/posts\/26681\/revisions\/26683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media\/26682"}],"wp:attachment":[{"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/media?parent=26681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/categories?post=26681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/u1f987.com\/en\/wp-json\/wp\/v2\/tags?post=26681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}