Twitter says hack of key staff led to celebrity, politician, biz account hijack mega-spree

'Coordinated social engineering attack’ paved the way for miscreants to tweet out Bitcoin scam to millions

71 Reg comments Got Tips?

Twitter has offered its initial analysis of the Wednesday mass hijacking of prominent twits' accounts – and suggested it all kicked off after its staff fell for social engineering.

Judging from leaked screenshots of Twitter's internal systems circulating online and seen by El Reg, it appears one or more miscreants were able to gain direct or indirect access to an administration panel used by Twitter employees to configure accounts, by tricking or coercing the social network's staff.

From there, the crooks were, at least in some cases, seemingly able to change the registered email addresses of celebrities, corporations, crypto-coin exchanges, publications, and politicians' accounts – think Apple, Uber, Bill Gates, Elon Musk, Joe Biden, and so on – to an inbox they controlled, requested password resets, and logged in to tweet Bitcoin scams to millions of followers. The miscreants may have been able to disable multi-factor authentication from the inside, too.

According to Vice, hackers boasted they had a paid mole inside Twitter who did all the dirty work for them. The social network's spokespeople said it was still investigating exactly how it all went down.

Twitter's support account spelled out its side of the story so far this evening:

The Twitter accounts of both The Register and your humble hack’s brother Anthony Sharwood are verified by the avian network. Both were unable to tweet once Twitter discovered the incident and both received no direct communication from Twitter about the status of our accounts nor any details of whether the incident posed a risk to personal data.

But not all functionality was removed. Sharwood the younger said he was able to send direct messages during the incident. "I sent a guy a DM to apologise that I couldn't respond to a tweet," he said.

Indeed, The Register's own verified account couldn't tweet, but could send direct messages as well as retweet and like other tweets.

And that’s all we know at the time of writing. The Register is willing to speculate about a few factors, namely:

  • Twitter appears not to have been aware of the account takeover until the scammy tweets appeared.
  • Social engineering of staff with known access to internal tools hints at spear-phishing. If the attackers knew who can access Twitter’s innards, that’s quite scary. If it was a broader attack, it suggests Twitter’s phishing defenses may need some improvements. If it was an inside job, Twitter has a huge trust and compartmentalization problem on its hands.
  • If the attackers were outside Twitter, it suggests that the company’s internal tools may be publicly accessible, and perhaps without multi-factor authentication.

The hijackers used their ill-gotten access to post tweets in which celebrities promised to double users’ Bitcoin balances as an act of philanthropy – and more than $100,000 in cryptocurrency was transferred by hopefuls with no sign of any payback. That's probably a better result than putting incendiary remarks in the mouth of a world leader with millions of followers, though. Or more-than-usually incendiary in the case of a certain US President. ®

SUBSCRIBE TO OUR WEEKLY TECH NEWSLETTER


Biting the hand that feeds IT © 1998–2020