Security Experts:

Connect with us

Hi, what are you looking for?



SIM Swapping Blamed for Hacking of Twitter CEO’s Account

Hackers were able to post offensive messages from the Twitter account of Jack Dorsey, the social media company’s CEO, after they tricked his mobile services provider into handing over his phone number.

Hackers were able to post offensive messages from the Twitter account of Jack Dorsey, the social media company’s CEO, after they tricked his mobile services provider into handing over his phone number.

The hackers who took control of Dorsey’s account used it to post racist and anti-Semitic messages and even bomb threats. The tweets were removed by Twitter after roughly half an hour.

The attack has been attributed to Chuckling Squad, a hacker group that in the past targeted other high-profile individuals, particularly social media influencers.

Following the incident, Twitter clarified that its systems had not been compromised. The company stated, “The phone number associated with the account was compromised due to a security oversight by the mobile provider. This allowed an unauthorized person to compose and send tweets via text message from the phone number. That issue is now resolved.”

The technique used by the hackers is called a SIM swap or port-out scam. In these attacks, the attacker uses social engineering to convince a mobile phone operator to transfer the targeted individual’s phone number to their own SIM card. This can be used to bypass SMS-based two-factor authentication (2FA), but in the attack targeting the Twitter CEO it served a different purpose.

It allowed the hackers to post messages to Dorsey’s account through Cloudhopper, a mobile messaging technology provider that Twitter acquired back in 2010. Cloudhopper allows users to tweet by sending their message via SMS to a specific number. Since the hackers gained control of Dorsey’s phone number, they could easily post messages to his account without actually having to log in.

It’s worth noting that SMS messages can be used to perform various tasks on Twitter, including following or unfollowing a specific user, turning notifications on or off, and retweeting messages.

SIM swapping appears to be the Chuckling Squad’s favorite method for hijacking social media accounts and they have often targeted AT&T.

“SIM swap scams have become a much more prominent and dangerous threat over the past year. It has been proven to be a shockingly easy way of subverting two-factor authentication by either successfully tricking carrier agents to move a user’s phone number to a new SIM card or through bribing one of these agents,” Ryan Rowcliffe, Lead of Solutions Architecture at SecureAuth, told SecurityWeek.

“Since carriers are the real targets in this scenario, they have a responsibility to look for suspicious patterns running through their call centers and customer service organizations in order to find fraudulent activity or reps who have been bribed by cybercriminals,” Rowcliffe added.

“At the very least, consumers should contact their phone carriers and request for additional security to be applied to their accounts such as not allowing account changes without a verification code delivered over a non-sms channel,” he said. “As an industry we should be working with phone carriers to find alternative ways to confirm possession of the phone prior to allowing changes to an account of this nature.”

Related: Nine Charged in SIM Hijacking Scheme

Related: Attackers Circumvent Two Factor Authentication Protections to Hack Reddit

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.