Pro-Trump social media platform GETTR was targeted by hackers shortly after launch — accounts were apparently compromised and tens of thousands of users had their data scraped and leaked online.
A Twitter-like platform, GETTR was launched on July 4 by Jason Miller, who served as a spokesperson for former U.S. President Donald Trump. The social media service claims to welcome people from all over the world and to promote freedom of speech.
Both the site and the GETTR mobile app highly resemble Twitter, and the platform even allows users to sign up using their Twitter accounts, claiming to be able to import content from Twitter.
The site, however, was opened to the public with unresolved security issues that were immediately exploited by hackers to gain access to the data of those who had already registered on GETTR.
On Sunday, an individual using the moniker of JubaBaghdad hacked GETTR and defaced some of the high-profile accounts on the social media platform, changing them to show the message “@JubaBaghdad was here 🙂 ^^ free palestine ^^.”
The hacker told Business Insider that hacking GETTR was easy from a technical perspective.
JubaBaghdad — and likely others — also scraped a significant amount of data from the new service.
According to Alon Gal, co-founder and CTO of cybersecurity firm Hudson Rock, the attackers exploited improper API implementations to access user data.
“This allowed them to extract usernames, names, bios, bdays, but most importantly, the emails which were supposed to be private, of over 85,000 users,” Alon Gal revealed on Twitter.
The collected data was shared on RaidForums, a popular hacker forum. The leaked files contained 87.971 entries, including user IDs, usernames, email addresses, nicknames, profile pictures, birth year, location, and more.
Related: Cybersecurity Firm Exposes Breach Database Containing 5 Billion User Records
Related: Swedish Public Health Agency Says Disease Database Targeted in Cyberattacks
Related: Security Breach Impacts State Police Database

More from Ionut Arghire
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
- Google Temporarily Offering $180,000 for Full Chain Chrome Exploit
- Toyota Discloses New Data Breach Involving Vehicle, Customer Information
- Adobe Inviting Researchers to Private Bug Bounty Program
- Critical Vulnerabilities Found in Faronics Education Software
Latest News
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
